Stuxbot Threat Intel Report
Summary
The "Stuxbot" cybercrime collective has initiated a broad phishing campaign, primarily targeting Microsoft Windows users without any specific targeting strategy. Their objective appears to be espionage, aiming for system control and escalation rather than financial gain.
Platforms in Crosshairs: Microsoft Windows
Threatened Entities: Windows Users
Potential Impact: Complete computer takeover / Domain escalation
Risk Level: Critical
Attack Tactics and Techniques
Stuxbot utilizes opportunistic phishing for initial access, leveraging breached email databases and publicly available data. The group has a modular Remote Access Tool (RAT) for espionage and maintains persistence with disk-based EXE files.
Lifecycle Overview
Initial Breach: Phishing emails with links to OneNote files containing a malicious batch file.
RAT Characteristics: The modular RAT includes screen capture, Mimikatz, and interactive CMD tools.
Persistence: EXE files deployed on the disk.
Lateral Movement: Uses Microsoft-signed PsExec and WinRM for internal propagation.
Indicators of Compromise (IOCs)
OneNote File:
https://transfer.sh/get/kNxU7/invoice.onehttps://mega.io/dl9o1Dz/invoice.one
Staging Entity (PowerShell Script):
https://pastebin.com/raw/AvHtdKb2https://pastebin.com/raw/gj58DKz
C&C Nodes:
91.90.213.14:443103.248.70.64:443141.98.6.59:443
SHA256 Hashes:
226A723FFB4A91D9950A8B266167C5B354AB0DB1DC225578494917FE53867EF2C346077DAD0342592DB753FE2AB36D2F9F1C76E55CF8556FE5CDA92897E99C7E018D37CBD3878258C29DB3BC3F2988B6AE688843801B9ABC28E6151141AB66D4
Hunting For Stuxbot With The Elastic Stack
The hunt for Stuxbot utilizes the Elastic Stack, with logs from multiple sources, including Windows, Sysmon, PowerShell, and Zeek.
Available Data
Windows audit logs under
windows*Sysmon logs under
windows*PowerShell logs under
windows*Zeek logs under
zeek*
Our search covers logs dating back to March 2023, containing approximately 118,975 entries in Windows logs and 332,261 in Zeek logs.
Environment Overview
The company setup includes around 200 employees with primary use of Office applications, Gmail for email, and Microsoft Edge for browsing. TeamViewer is used for remote support, and Active Directory manages devices.
Hunting Activities
Invoice File Download Detection
Query:
event.code:15 AND file.name:*invoice.oneResult: Identified "invoice.one" file download by user Bob on 26th March 2023 at 22:05:47.
File Execution Detection
Query:
event.code:11 AND file.name:invoice.one*Hostname:
WS001with IP192.168.28.130.Further checks reveal
cmd.exeinitiated the execution of "invoice.bat" and PowerShell from Pastebin.
Network Activity Review
Query:
source.ip:192.168.28.130 AND dns.question.name:*Findings: File download from
file.ioverified with DNS and IP matches.
Command Execution Tracing
OneNote accessed "invoice.one" file and initiated
cmd.exe.PowerShell script download from Pastebin was detected with suspicious arguments.
Persistence Mechanism Check
Query:
process.name:"default.exe"Findings: "default.exe" initiated DNS resolutions and network connections consistent with C2 behavior.
Further Lateral Movement Detection
"SharpHound.exe" used for Active Directory reconnaissance on both
WS001andPKI.svc-sql1account credentials likely compromised.
Conclusion and Next Steps
Stuxbot’s activities have been mapped through multiple stages from initial access to lateral movement and persistence. The compromised svc-sql1 account suggests critical exposure within the organization. Immediate steps for containment and further analysis are recommended to mitigate ongoing risks.
Last updated