156. Threat Actors Abuse OpenSSH to Run a Simple Backdoor

Hello everyone!

LOLBAS are everywhere! And we see more and more of them abused by real adversaries. For example, OpenSSH, which is included in newer versions of Windows!

Xavier Mertens shared a curious example of how threat actors abuse it. The adversary executes ssh.exe with custom configuration file:

C:\Windows\System32\OpenSSH\ssh.exe -F "C:\Windows\Temp\config"

So, for example, we can hunt for ssh.exe executed with -F and config file located under Temp folder:

event_type: "processcreatewin"

AND

proc_file_name: "ssh.exe"

AND

cmdline: ("f" AND "temp")

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge