266. Hunting for PteroGraphin

Hello everyone!

ESET released a report on potential collaboration of two notorious threat actors: Gamaredon and Turla. So let's look at some hunting opportunities.

According to the report, Turla leveraged Gamaredon's downloaders to deliver its own malware.

Gamaredon's downloaders, for example, PteroGraphin, are PowerShell-based and use telegra[.]ph for storing the payloads, so it enables us to hunt for similar behaviors:

event_type: "dnsreqwin"

AND

dns_rname: "telegra.ph"

AND

proc_file_name: "powershell.exe"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge