251. That's How MostereRAT Abuses Ruby

Hello everyone!

I think everyone is already got used to the fact that adversaries abuse Python. But there're still more interesting examples of Command and Scripting Interpreter (T1059)!

For example, according to this reportMostereRAT leveraged a a Ruby script to execute one of the stages:

C:\ProgramData\Windows\ruby\ruby.exe -e "system('start C:\ProgramData\Windows\svchost.exe C:\ProgramData\Windows\svchost.db channel-8df91be7c24e');exit();"

As you can see, ruby.exe runs from an uncommon path. You can use it and, for example, exclude common paths for your environment, to build your hunting query:

event_type: "processcreatewin"

AND

proc_file_originalfilename: "ruby.exe"

AND

proc_file_path: "programdata"

See you tomorrow!

Comments

Popular posts from this blog

343. Ransomware Gangs Abuse SystemSettingsAdminFlows to Evade Defenses

082. Huniting for Malicious Browser Extensions

391. Hunting for TeamPCP's Stealer