Skip to content

Commit

Permalink
initial
Browse files Browse the repository at this point in the history
  • Loading branch information
mthaxton committed May 17, 2024
1 parent 3e6e591 commit e42ebaf
Showing 1 changed file with 18 additions and 0 deletions.
18 changes: 18 additions & 0 deletions win_malware/armageddon_vbs_backdoor.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
armageddon_vbs_backdoor:
query: 'SELECT f.filename, f.path, f.directory, st.name, st.action
FROM file f JOIN scheduled_tasks st ON st.action LIKE concat('%', concat(f.filename, '%'))
WHERE lower(f.directory) LIKE "%%\appdata\roaming\%"
AND f.path LIKE "%.%%"
AND lower(st.action) LIKE "%e:vbscript%"
AND (SELECT COUNT(*) FROM file WHERE lower(directory) LIKE "%%\appdata\roaming\%" AND path LIKE "%.%%") >= 2;'
interval: 86400
snapshot: true
description: A backdoor associated with the Armageddon threat actor was installed on the system. Armageddon is a group notable for performing attacks on behalf of the Russian Federal Security Service (FSB). This backdoor is written in Visual Basic and serves to establish persistence on the system and then download & execute additional files on the system.
references:
- ref
mitre_tactics:
- Persistence: TA0003
mitre_techniques:
- Scheduled Task : T1053.005
platform:
- windows

0 comments on commit e42ebaf

Please sign in to comment.