081. Detecting EarthWorm Network Tunnel Tool
Hello everyone! Let's talk about another popular among adversaries tunneling tool - EarthWorm. The threat actors may use it for network tunneling with a SOCKS5 server and port transfer functionalities.
I think you want some example observed ITW, right? Here's one from a recent Cisco Talos report on UAT-5918:
Run32.exe -s ssocksd -l 8888
If we look at EarthWorm's website, we can find more interesting command line arguments we can use to build detection logic, for example, "rssocks" and "rcsocks". So, let's search for process creation events with "ssocksd", "rcsocks" or "rssocks" in the command line:
event_type: "processcreate"
AND
cmdline: ("ssocksd" OR "rcsocks" OR "rssocks")
Of course, you can experiment with other available arguments as well!
See you tomorrow!
Comments
Post a Comment