310. Adversaries Keep Abuse Uncommon RMMs

Hello everyone!

Adversaries keep experimenting with various remote management platforms, so today we'll look at another example of Remote Access Tools: Remote Desktop Software (T1219.002).

Let's look at UNK_SmudgedSerpent. The adversary leveraged phishing emails for credential harvesting as well as to deliver archives with MSI files those loaded RMM payloads.

In most cases the threat actors used PDQConnect Remote Monitoring & Management software.

If you don't use it in your environment, it may be a good target for hunting:

event_type: "processcreatewin"

AND

proc_file_productname: "PDQConnectAgent"

You can also hunt for related domains:

event_type: "dnsreqwin"

AND

dns_rname: "app.pdq.com"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge