264. Hunting for SnakeDisk

Hello everyone!

IBM uncovered another malware family they called SnakeDisk, which belongs to notorious Mustang Panda (or Horned Werewolf as we track it). It leverages a very interesting technique - Replication Through Removable Media (T1091).

The malware is a USB worm, so its behaviors include moving files and executables located on external drives:

robocopy <drive_letter>:\ <drive_letter>:\<urd>\<uud>\ /XD

"<drive_letter>:\<urd>\" /XF "<drive_letter>:\<unendl_org>" /XF

"<drive_letter>:\<usb_volumename>.exe" /XD "System Volume Information" /E 

/MOVE

Let's hunt for running robocopy for moving files (/MOVE option) with some files and directories excluded (/XD and /XF options):

event_type: "processcreatewin"

AND

proc_file_path: "robocopy.exe"

AND

cmdline: ("xd" AND "xf" AND "move")

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge