264. Hunting for SnakeDisk

Hello everyone!

IBM uncovered another malware family they called SnakeDisk, which belongs to notorious Mustang Panda (or Horned Werewolf as we track it). It leverages a very interesting technique - Replication Through Removable Media (T1091).

The malware is a USB worm, so its behaviors include moving files and executables located on external drives:

robocopy <drive_letter>:\ <drive_letter>:\<urd>\<uud>\ /XD

"<drive_letter>:\<urd>\" /XF "<drive_letter>:\<unendl_org>" /XF

"<drive_letter>:\<usb_volumename>.exe" /XD "System Volume Information" /E 

/MOVE

Let's hunt for running robocopy for moving files (/MOVE option) with some files and directories excluded (/XD and /XF options):

event_type: "processcreatewin"

AND

proc_file_path: "robocopy.exe"

AND

cmdline: ("xd" AND "xf" AND "move")

See you tomorrow!

Comments

Popular posts from this blog

082. Huniting for Malicious Browser Extensions

033. Free Google Threat Intelligence Course

068. Detecting RMMs from Ransomware Affiliate's Toolkit: MeshAgent