264. Hunting for SnakeDisk
Hello everyone!
IBM uncovered another malware family they called SnakeDisk, which belongs to notorious Mustang Panda (or Horned Werewolf as we track it). It leverages a very interesting technique - Replication Through Removable Media (T1091).
The malware is a USB worm, so its behaviors include moving files and executables located on external drives:
robocopy <drive_letter>:\ <drive_letter>:\<urd>\<uud>\ /XD
"<drive_letter>:\<urd>\" /XF "<drive_letter>:\<unendl_org>" /XF
"<drive_letter>:\<usb_volumename>.exe" /XD "System Volume Information" /E
/MOVE
Let's hunt for running robocopy for moving files (/MOVE option) with some files and directories excluded (/XD and /XF options):
event_type: "processcreatewin"
AND
proc_file_path: "robocopy.exe"
AND
cmdline: ("xd" AND "xf" AND "move")
See you tomorrow!
Comments
Post a Comment