362. Ransomware Gangs Use This Tool for Discovery

Hello everyone!

Today we'll talk about how ransomware gangs abuse legitimate software for File and Directory Discovery (T1083).

And our example for today's post - NightSpire. Anong other tools, the gang leveraged Everything - a legitimate tool that enables an adversary to index files and get a deeper understanding of data available on the compromised system.

So, this tool, especially if it's not widely used internaly, may be a good target for hunting:

event_type: "processcreatewin"

AND

proc_file_originalfilename: "everything.exe"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge