267. Hunting for PteroEffigy

Hello everyone!

Let's keep digging into the report on Gamaredon and Turla collaboration. This time we'll look at another Gamaredon's malware - PteroEffigy.

PteroEffigy is another PowerShell-based downloader, and it also abuses a legitimate web service. But unlike PteroGraphin, it leverages api.gofile[.]io instead of telegra[.]ph.

Of course, we can convert this knowledge into a hunting query:

event_type: "dnsreqwin"

AND

dns_rname: "gofile.io"

AND

proc_file_name: "powershell.exe"

See you tomorrow!


Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge