260. That's How Bloody Wolf Abuses Telegram for Exfiltration

Hello everyone!

Today we'll keep looking at Bloody Wolf, focusing on how the adversary uses the following technique: Exfiltration Over Web Service (T1567).

If we look into this report, we can see that the adversary used malicious JAR files to install NetSupport to the target system. The file also sent the name of the compromised system to a dedicated Telegram chat.

And, of course, we can look for similar behavior:

event_type: "dnsreqwin"

AND

dns_rname: "telegram.org"

AND

proc_file_path: "java.exe"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge