📢 Private report | WS_FTP Exploit Activity Leads to Sliver
We are sharing this private report to highlight the TTPs used in an intrusion related to the recent WS_FTP vulnerability. This report became available to our paid customers a couple of weeks ago.
Report: https://thedfirreport.com/wp-content/uploads/2023/11/WS_FTP-Exploit-Activity-leads-to-Sliver.pdf
📅 Initial Access (Oct 2, 2023):
Threat actors exploited WS_FTP CVE-2023-40044. They established a foothold using Sliver beacons, specifically with executable files cl.exe and sl.exe. Command and control traced back to 45[.]93[.]138[.]44:3131.
🕵️ Reconnaissance (Oct 13, 2023):
Over a 6-hour span:
• Used WinPeas for system recon
• Attempted credential access via Mimikatz but failed.
• Ran SharpHound, likely for Active Directory enumeration.
🛠️ Further Actions (Oct 18, 2023):
Threat Actors returned:
• Checked for network shares with PowerView
• Searched through Sticky Notes and event logs
• Utilized C:\temp as a staging area, moving confidential documents there using PowerShell
• Used PsMapExec for various tasks
🔑 Elevated Privileges & Collection:
• Accessed the domain controller & dumped the ntds.dit database.
• Exported Security & System registry hives from DC
• Accessed Security Insurance documents and staged them for exfil
• Attempted AdminSDHolder abuse and ran GodPotato
⚠️ Defense Evasion:
Throughout the intrusion, the threat actors:
• Removed payloads post-execution
• Deleted specific PowerShell Transcript Logs
• HOK lead to a lot of spelling errors when executing commands
• Only used sliver throughout the intrusion
➡️This is an example of a private report that we make available to our customers on a weekly basis. If you are not a customer and would like to get access to these reports, please contact us - https://thedfirreport.com/contact/ #AllIntel
------------------------------------------------------------------------------------
➡️Customers with access to our private ruleset benefit from our curated collection of Sigma rules, based on observed intrusions. Below is one of the many rules we created for this intrusion.
https://github.com/The-DFIR-Report/Sigma-Rules/blob/main/rules/windows/process_creation/proc_creation_win_conhost_headless.yml
------------------------------------------------------------------------------------
➡️Interested in our Mentoring & Coaching Program? Both our mentoring and coaching programs aim to offer you the right mix of personalized guidance, industry knowledge, and practical skills.
https://thedfirreport.com/services/mentoring-coaching-program/