286. That's How Astaroth Abusing GitHub

Hello everyone!

I know you got a bit tired of legitimate services abuse, but it's always a great target for threat hunting, so it's important to document it and add to your library.

This time we'll look how Astaroth leveraged GitHub for storing configuration. What's more, it's stored inside an image, for example:

hxxps://raw.githubusercontent[.]com//dridex2024//razeronline//refs/heads/main/razerlimpa[.]png

So, we can look for suspicious processes accessing raw.githubusercontent[.]com. For example, in this case the payload was injected into RegSvc.exe process:

event_type: "dnsreqwin"

AND

dns_rname: "raw.githubusercontent.com"

AND

proc_file_path: "RegSvc.exe"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge