SSH Tunnelling to Punch Through Corporate Firewalls - Updated take on one of the oldest LOLBINs | JUMPSEC LABS
Common Information
Type Value
UUID b274a8de-9a52-4b29-beec-2c86690e6f56
Fingerprint 26538b516b24b6c7
Analysis status DONE
Considered CTI value 0
Text language
Published Aug. 13, 2024, 6:40 p.m.
Added to db Aug. 31, 2024, 6:25 a.m.
Last updated Nov. 17, 2024, 6:54 p.m.
Headline SSH Tunnelling to Punch Through Corporate Firewalls – Updated take on one of the oldest LOLBINs
Title SSH Tunnelling to Punch Through Corporate Firewalls - Updated take on one of the oldest LOLBINs | JUMPSEC LABS
Detected Hints/Tags/Attributes 59/2/15
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 149 JUMPSEC LABS https://labs.jumpsec.com/feed/ 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 88
secretsdump.py
Details Domain 14
scanme.nmap.org
Details Domain 1
msservicesupdate.uksouth.cloudapp.azure.com
Details Domain 1
region.cloudapp.azure.com
Details Domain 339
system.net
Details File 1
c:\windows\system32\openssh\ssh.exe
Details File 85
secretsdump.py
Details File 28
ssh.exe
Details File 4
scp.exe
Details File 1
totally_okay_payload.dll
Details File 1
c:\public\appdata\version.dll
Details File 27
invoke-mimikatz.ps1
Details File 1
amsibypass.ps1
Details IPv4 1441
127.0.0.1
Details Url 1
http://192.x.x.x/invoke-mimikatz.ps1