114. Adversaries Abuse Magnet RAM Capture to Extract Credentials
Hello everyone! Forensic tools help us during incident response engagements, but such tools also may help adversaries to solve various tasks!
For example, ToyMaker abused Magnet RAM Capture to obtain a memory dump of the compromised host, and used it to extract credentials:
MRCv120.exe /accepteula /silent /go
We can use both metadata and command line parameters for detection:
event_type: "processcreatewin"
AND
proc_file_productname: "Magnet RAM Capture"
AND
cmdline: ("accepteula" AND "silent" AND "go")
See you tomorrow!
Comments
Post a Comment