104. Hunting for Paper Werewolf: FlashFileGrabber

Hello everyone! The last one on Paper Werewolf - I promise! This time we'll look at FlashFileGrabber. This module allows the adversary to collect various files from removable media.


If we look inside the script, we can see that there are lots of file extensions. Of course, we can use it for threat hunting!

You can find various extensions inside PowerShell scripts adversaries use for sensitive data collection, so you can definitely experiment with a number of them, for example:

event_type: "ScriptExecutionWin"

AND

script_text: ("txt" AND "doc" AND "docx" AND "xls" AND "xlsx" AND "pdf" AND "rar" AND "zip")

I hope your threat hunting missions are going well!

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge