323. Adversaries Keep Using NetExec: Forensic Perspective

Hello everyone!

Let's look at NetExec one more time, but this time focus on forensic perspective and related artifacts.

Recently the tool was used by Lynx ransomware affiliates. And according to the report, it creates multiple folders and files, which can be used both for detection and forensic analysis.

Among others, it creates .nxc folder and lots of databases, for example, smb.db, rdp.db, winrm.db, etc.

The databases contain the results of execution of corresponding modules, and may be a forensic goldmine!

Also, searching for suspicious folders and files creation events may be a good option as well:

event_type: "filecreatewin"

AND

file_path: ("nxc.conf" OR "ftp.db" OR "ldap.db" OR "mssql.db" OR "nfs.db" OR "rdp.db" OR "smb.db" OR "ssh.db" OR "vnc.db" OR "winrm.db" OR "wmi.db")

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge