Florian Roth ⚡
Florian Roth ⚡

@cyb3rops

4 Tweets 18 reads Oct 26, 2019
Yes, an old #Sigma rule that detect Office programs spawning processes in user folders would have detected #APT28's recent campaign agains Kazakhstan
Tweet by @MeltX0R
Dropper in Sandbox
app.any.run
Rule
github.com
@MeltX0R Also check that User-Agent without 'AppleWebKit ..' used by the malware.
Netscape Navigator 5 (or alike) on Windows 10 shouldn't be that common.
Mozilla/5.0 (Windows NT 10.0; Win64; x64)
@MeltX0R Bam 💥
Added to proxy UA Sigma rule
#L53" target="_blank" rel="noopener" onclick="event.stopPropagation()">github.com
Providing immediate detection.
They cannot hide.
@MeltX0R Looks similar to the UA used by CobaltStrike beacons and found in another Sigma rule in our repo
#L24" target="_blank" rel="noopener" onclick="event.stopPropagation()">github.com

Loading suggestions...