156. Threat Actors Abuse OpenSSH to Run a Simple Backdoor
Hello everyone!
LOLBAS are everywhere! And we see more and more of them abused by real adversaries. For example, OpenSSH, which is included in newer versions of Windows!
Xavier Mertens shared a curious example of how threat actors abuse it. The adversary executes ssh.exe with custom configuration file:
C:\Windows\System32\OpenSSH\ssh.exe -F "C:\Windows\Temp\config"
So, for example, we can hunt for ssh.exe executed with -F and config file located under Temp folder:
event_type: "processcreatewin"
AND
proc_file_name: "ssh.exe"
AND
cmdline: ("f" AND "temp")
See you tomorrow!
Comments
Post a Comment