231. Adversaries Use Paste[.]rs to Host Stealer Payloads

Hello everyone!

Nowadays adversaries often abuse Telegram to make it a C2 channel. But in some cases it's even more interesting. Today we'll talk about the following technique: Web Service: Dead Drop Resolver (T1102.001).

And we'll look at a stealer with a quite funny name - Noodlophile. The adversary leveraged scripts, which extracted a part of URL from the description of a Telegram group. For example, "Gc2BJ". To store the payload the threat actors used paste[.]rs, so the final URL would be hXXps://paste[.]rs/Gc2BJ.

So, why not to hunt for suspicious connections to paste[.]rs?

event_type: "dnsreq"

AND

dns_rname: "paste.rs"

See you tomorrow!


Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge