240. Adversaries Abuse Enterprise Incident Response Tools
Hello everyone!
We already talked about abusing forensic and incident response tools. Let's look at a curious example of how adversaries leverage such software instead of Remote Access Tools (T1219).
According to Sophos report, an adversary leveraged Velociraptor, which was configured to communicate with C2 server velo[.]qaubctgg[.]workers[.]dev.
Yes, you may even use Velociraptor in your environment, but it's unlikely be configured to communicate with workers[.]dev domains. And we can use it to build the query:
event_type: "dnsreqwin"
AND
dns_rname: "workers.dev"
AND
proc_file_path: "velociraptor.exe"
See you tomorrow!
Comments
Post a Comment