079. Hunting for DarkWatchman RAT

Hello everyone! How are your threat hunting missions going? Let's talk about DarkWatchman - a RAT leveraged by an activity cluster we track as Watch Wolf.


So, let's use it to generate a threat hunting hypothesis. Let's focus on the following behavior:

wscript.exe "C:\Users\user\AppData\Local\c784477d0.js" 188

As you can see, it abuses wscript.exe to execute a malicious JS-script located in the specific folder. So, we can hunt for suspicious JS-scripts executed from the same folder or subfolders:

event_type: "processcreatewin"

AND

proc_file_name: "wscript.exe"

AND

cmdline: "AppData\\Local" AND "js"

If you want to learn more about this RAT's behaviours - here's a sample for you.

See you tomorrow!

Comments

Popular posts from this blog

082. Huniting for Malicious Browser Extensions

033. Free Google Threat Intelligence Course

068. Detecting RMMs from Ransomware Affiliate's Toolkit: MeshAgent