323. Adversaries Keep Using NetExec: Forensic Perspective
Hello everyone!
Let's look at NetExec one more time, but this time focus on forensic perspective and related artifacts.
Recently the tool was used by Lynx ransomware affiliates. And according to the report, it creates multiple folders and files, which can be used both for detection and forensic analysis.
Among others, it creates .nxc folder and lots of databases, for example, smb.db, rdp.db, winrm.db, etc.
The databases contain the results of execution of corresponding modules, and may be a forensic goldmine!
Also, searching for suspicious folders and files creation events may be a good option as well:
event_type: "filecreatewin"
AND
file_path: ("nxc.conf" OR "ftp.db" OR "ldap.db" OR "mssql.db" OR "nfs.db" OR "rdp.db" OR "smb.db" OR "ssh.db" OR "vnc.db" OR "winrm.db" OR "wmi.db")
See you tomorrow!

Comments
Post a Comment