135. Hunting for DarkCloud Stealer

Hello everyone!

Today I want to show you that your previously created hunting queries can cover many different threats.

As you remember, we created the following query to hunt for suspicious .vbs-files in the startup folder:

event_type: "processcreatewin"

AND

cmdline: ("startup" AND "vbs")

We can use the same query to hunt for DarkCloud Stealer as it has a similar behavior marker:

wscript.exe "%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\antholite.vbs"

Another interesting marker related to this threat is abusing showip[.]net to check for the victim’s public IP address:

event_type: "dnsreqwin"

AND

dns_rname: "showip.net"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge