Stuxbot Threat Intel Report

Summary

The "Stuxbot" cybercrime collective has initiated a broad phishing campaign, primarily targeting Microsoft Windows users without any specific targeting strategy. Their objective appears to be espionage, aiming for system control and escalation rather than financial gain.

  • Platforms in Crosshairs: Microsoft Windows

  • Threatened Entities: Windows Users

  • Potential Impact: Complete computer takeover / Domain escalation

  • Risk Level: Critical

Attack Tactics and Techniques

Stuxbot utilizes opportunistic phishing for initial access, leveraging breached email databases and publicly available data. The group has a modular Remote Access Tool (RAT) for espionage and maintains persistence with disk-based EXE files.

Lifecycle Overview

  1. Initial Breach: Phishing emails with links to OneNote files containing a malicious batch file.

  2. RAT Characteristics: The modular RAT includes screen capture, Mimikatz, and interactive CMD tools.

  3. Persistence: EXE files deployed on the disk.

  4. Lateral Movement: Uses Microsoft-signed PsExec and WinRM for internal propagation.

Indicators of Compromise (IOCs)

OneNote File:

  • https://transfer.sh/get/kNxU7/invoice.one

  • https://mega.io/dl9o1Dz/invoice.one

Staging Entity (PowerShell Script):

  • https://pastebin.com/raw/AvHtdKb2

  • https://pastebin.com/raw/gj58DKz

C&C Nodes:

  • 91.90.213.14:443

  • 103.248.70.64:443

  • 141.98.6.59:443

SHA256 Hashes:

  • 226A723FFB4A91D9950A8B266167C5B354AB0DB1DC225578494917FE53867EF2

  • C346077DAD0342592DB753FE2AB36D2F9F1C76E55CF8556FE5CDA92897E99C7E

  • 018D37CBD3878258C29DB3BC3F2988B6AE688843801B9ABC28E6151141AB66D4

Hunting For Stuxbot With The Elastic Stack

The hunt for Stuxbot utilizes the Elastic Stack, with logs from multiple sources, including Windows, Sysmon, PowerShell, and Zeek.

Available Data

  • Windows audit logs under windows*

  • Sysmon logs under windows*

  • PowerShell logs under windows*

  • Zeek logs under zeek*

Our search covers logs dating back to March 2023, containing approximately 118,975 entries in Windows logs and 332,261 in Zeek logs.

Environment Overview

The company setup includes around 200 employees with primary use of Office applications, Gmail for email, and Microsoft Edge for browsing. TeamViewer is used for remote support, and Active Directory manages devices.

Hunting Activities

  1. Invoice File Download Detection

    • Query: event.code:15 AND file.name:*invoice.one

    • Result: Identified "invoice.one" file download by user Bob on 26th March 2023 at 22:05:47.

  2. File Execution Detection

    • Query: event.code:11 AND file.name:invoice.one*

    • Hostname: WS001 with IP 192.168.28.130.

    • Further checks reveal cmd.exe initiated the execution of "invoice.bat" and PowerShell from Pastebin.

  3. Network Activity Review

    • Query: source.ip:192.168.28.130 AND dns.question.name:*

    • Findings: File download from file.io verified with DNS and IP matches.

  4. Command Execution Tracing

    • OneNote accessed "invoice.one" file and initiated cmd.exe.

    • PowerShell script download from Pastebin was detected with suspicious arguments.

  5. Persistence Mechanism Check

    • Query: process.name:"default.exe"

    • Findings: "default.exe" initiated DNS resolutions and network connections consistent with C2 behavior.

  6. Further Lateral Movement Detection

    • "SharpHound.exe" used for Active Directory reconnaissance on both WS001 and PKI.

    • svc-sql1 account credentials likely compromised.

Conclusion and Next Steps

Stuxbot’s activities have been mapped through multiple stages from initial access to lateral movement and persistence. The compromised svc-sql1 account suggests critical exposure within the organization. Immediate steps for containment and further analysis are recommended to mitigate ongoing risks.

Last updated