231. Adversaries Use Paste[.]rs to Host Stealer Payloads
Hello everyone!
Nowadays adversaries often abuse Telegram to make it a C2 channel. But in some cases it's even more interesting. Today we'll talk about the following technique: Web Service: Dead Drop Resolver (T1102.001).
And we'll look at a stealer with a quite funny name - Noodlophile. The adversary leveraged scripts, which extracted a part of URL from the description of a Telegram group. For example, "Gc2BJ". To store the payload the threat actors used paste[.]rs, so the final URL would be hXXps://paste[.]rs/Gc2BJ.
So, why not to hunt for suspicious connections to paste[.]rs?
event_type: "dnsreq"
AND
dns_rname: "paste.rs"
See you tomorrow!
Comments
Post a Comment