286. That's How Astaroth Abusing GitHub
Hello everyone!
I know you got a bit tired of legitimate services abuse, but it's always a great target for threat hunting, so it's important to document it and add to your library.
This time we'll look how Astaroth leveraged GitHub for storing configuration. What's more, it's stored inside an image, for example:
hxxps://raw.githubusercontent[.]com//dridex2024//razeronline//refs/heads/main/razerlimpa[.]png
So, we can look for suspicious processes accessing raw.githubusercontent[.]com. For example, in this case the payload was injected into RegSvc.exe process:
event_type: "dnsreqwin"
AND
dns_rname: "raw.githubusercontent.com"
AND
proc_file_path: "RegSvc.exe"
See you tomorrow!
Comments
Post a Comment