135. Hunting for DarkCloud Stealer
Hello everyone!
Today I want to show you that your previously created hunting queries can cover many different threats.
As you remember, we created the following query to hunt for suspicious .vbs-files in the startup folder:
event_type: "processcreatewin"
AND
cmdline: ("startup" AND "vbs")
We can use the same query to hunt for DarkCloud Stealer as it has a similar behavior marker:
wscript.exe "%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\antholite.vbs"
Another interesting marker related to this threat is abusing showip[.]net to check for the victim’s public IP address:
event_type: "dnsreqwin"
AND
dns_rname: "showip.net"
See you tomorrow!
Comments
Post a Comment