Securonix Threat Labs Security Advisory: Detecting STEEP#MAVERICK: New Covert Attack Campaign Targeting Military Contractors
Tags
Common Information
Type | Value |
---|---|
UUID | 4b8eeee2-831b-4b09-ac68-efd7324023f3 |
Fingerprint | f00d8df2413babce |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Sept. 28, 2022, 3:33 p.m. |
Added to db | Jan. 16, 2023, 3:54 p.m. |
Last updated | Nov. 17, 2024, 6:56 p.m. |
Headline | Securonix Threat Labs Security Advisory: Detecting STEEP#MAVERICK: New Covert Attack Campaign Targeting Military Contractors |
Title | Securonix Threat Labs Security Advisory: Detecting STEEP#MAVERICK: New Covert Attack Campaign Targeting Military Contractors |
Detected Hints/Tags/Attributes | 93/4/53 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 2 | terma.dev |
|
Details | Domain | 107 | system.management |
|
Details | Domain | 1 | terma.vip |
|
Details | Domain | 3 | terma.app |
|
Details | Domain | 1 | terma.icu |
|
Details | Domain | 2 | terma.wiki |
|
Details | Domain | 1 | terma.pics |
|
Details | Domain | 1 | terma.lol |
|
Details | Domain | 2 | terma.ink |
|
Details | Domain | 1 | cobham-satcom.onrender.com |
|
Details | Domain | 1 | onrender.com |
|
Details | Domain | 145 | threatpost.com |
|
Details | Domain | 58 | www.cloudflare.com |
|
Details | Domain | 12 | www.mdsec.co.uk |
|
Details | Domain | 32 | lolbas-project.github.io |
|
Details | Domain | 10 | pentestlab.blog |
|
Details | Domain | 12 | www.blackhillsinfosec.com |
|
Details | File | 2 | benefits.pdf |
|
Details | File | 2125 | cmd.exe |
|
Details | File | 1208 | powershell.exe |
|
Details | File | 3 | tracing.ps |
|
Details | File | 33 | forfiles.exe |
|
Details | File | 97 | mpcmdrun.exe |
|
Details | File | 249 | schtasks.exe |
|
Details | File | 18 | pcalua.exe |
|
Details | File | 9 | wsreset.exe |
|
Details | File | 4 | header.png |
|
Details | File | 15 | powershell.core |
|
Details | sha256 | 1 | da0888f06b2e690a3a4f52f3b04131f7a181c12c3cb8e6861fc67ff062beef37 |
|
Details | sha256 | 1 | 691c0a362337f37cf6d92b7a80d7c6407c433f1b476406236e565c6ade1c5e87 |
|
Details | IPv4 | 1 | 28.199.53.243 |
|
Details | IPv4 | 1 | 165.227.139.39 |
|
Details | MITRE ATT&CK Techniques | 409 | T1566 |
|
Details | MITRE ATT&CK Techniques | 627 | T1027 |
|
Details | MITRE ATT&CK Techniques | 504 | T1140 |
|
Details | MITRE ATT&CK Techniques | 534 | T1005 |
|
Details | MITRE ATT&CK Techniques | 550 | T1112 |
|
Details | MITRE ATT&CK Techniques | 460 | T1059.001 |
|
Details | MITRE ATT&CK Techniques | 310 | T1047 |
|
Details | MITRE ATT&CK Techniques | 207 | T1547 |
|
Details | MITRE ATT&CK Techniques | 480 | T1053 |
|
Details | MITRE ATT&CK Techniques | 275 | T1053.005 |
|
Details | Url | 1 | https://terma.dev/0 |
|
Details | Url | 1 | https://threatpost.com/powershell-payload-analysis-malware/165188 |
|
Details | Url | 1 | https://www.cloudflare.com/learning/cdn/what-is-a-cdn |
|
Details | Url | 2 | https://www.mdsec.co.uk/2018/06/exploring-powershell-amsi-and-logging-evasion |
|
Details | Url | 1 | https://lolbas-project.github.io/lolbas/binaries/pcalua |
|
Details | Url | 1 | https://lolbas-project.github.io/lolbas/binaries/wsreset |
|
Details | Url | 1 | https://pentestlab.blog/2020/01/21/persistence-wmi-event-subscription |
|
Details | Url | 1 | https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_logging_windows?view=powershell-7.2 |
|
Details | Url | 1 | https://www.blackhillsinfosec.com/getting-started-with-sysmon |
|
Details | Windows Registry Key | 2 | HKCU\Software\Classes\AppX82a6gwre4fdg3bt635tn5ctqjf8msdd2\Shell\open\command |
|
Details | Windows Registry Key | 4 | HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging |