221. Adversaries Abuse Lua to Load Stealers

Hello everyone!

Command and Scripting Interpreter (T1059) is an extremely popular technique. As you know, often use Windows Command Shell (T1059.003) and PowerShell (T1059.001). But in some cases we can observe more interesting interpreters.

For example, according to this report on SmartLoader, the adversary abused Lua (T1059.011) to run obfuscated malicious scripts. The threat actors distributed archives via GitHub repositores. Each archive contained LuaJIT executable and DLL, an obfuscated malicious Lua script and a batch file to run it.

If you look through the archives, you can see that the DLL is named lua51.dll in all cases, so we use it for our hunting query:

event_type: "imageload"

AND

file_path: "lua51.dll"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge