287. Adversaries Abuse Dpaste to Store Malicious Files

Hello everyone!

Yes, one more legitimate web service is used by adversaries to store malicious files. But it's always a detection or hunting opportunity for us!

So, according to this report, the adversary used a malicious PowerShell script to download a TXT file from dpaste[.]com

We can easily translate this behavior to a hunting query:

event_type: "dnsreqwin"

AND

dns_rname: "dpaste.com"

AND

proc_file_path: "powershell.exe"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge