081. Detecting EarthWorm Network Tunnel Tool

Hello everyone! Let's talk about another popular among adversaries tunneling tool - EarthWorm. The threat actors may use it for network tunneling with a SOCKS5 server and port transfer functionalities.


I think you want some example observed ITW, right? Here's one from a recent Cisco Talos report on UAT-5918:

Run32.exe -s ssocksd -l 8888

If we look at EarthWorm's website, we can find more interesting command line arguments we can use to build detection logic, for example, "rssocks" and "rcsocks". So, let's search for process creation events with "ssocksd", "rcsocks" or "rssocks" in the command line:

event_type: "processcreate"

AND

cmdline: ("ssocksd" OR "rcsocks" OR "rssocks")

Of course, you can experiment with other available arguments as well!

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge