287. Adversaries Abuse Dpaste to Store Malicious Files
Hello everyone!
Yes, one more legitimate web service is used by adversaries to store malicious files. But it's always a detection or hunting opportunity for us!
So, according to this report, the adversary used a malicious PowerShell script to download a TXT file from dpaste[.]com.
We can easily translate this behavior to a hunting query:
event_type: "dnsreqwin"
AND
dns_rname: "dpaste.com"
AND
proc_file_path: "powershell.exe"
See you tomorrow!
Comments
Post a Comment