251. That's How MostereRAT Abuses Ruby

Hello everyone!

I think everyone is already got used to the fact that adversaries abuse Python. But there're still more interesting examples of Command and Scripting Interpreter (T1059)!

For example, according to this reportMostereRAT leveraged a a Ruby script to execute one of the stages:

C:\ProgramData\Windows\ruby\ruby.exe -e "system('start C:\ProgramData\Windows\svchost.exe C:\ProgramData\Windows\svchost.db channel-8df91be7c24e');exit();"

As you can see, ruby.exe runs from an uncommon path. You can use it and, for example, exclude common paths for your environment, to build your hunting query:

event_type: "processcreatewin"

AND

proc_file_originalfilename: "ruby.exe"

AND

proc_file_path: "programdata"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge