Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

SocGholish

SocGholish is a JavaScript-based loader malware that has been used since at least 2017. It has been observed in use against multiple sectors globally for initial access, primarily through drive-by-downloads masquerading as software updates. SocGholish is operated by Mustard Tempest and its access has been sold to groups including Indrik Spider for downloading secondary RAT and ransomware payloads.(Citation: SentinelOne SocGholish Infrastructure November 2022)(Citation: SocGholish-update)(Citation: Red Canary SocGholish March 2024)(Citation: Secureworks Gold Prelude Profile)
ID: S1124
Associated Software: FakeUpdates
Type: MALWARE
Platforms: Windows
Created: 22 Mar 2024
Last Modified: 06 Apr 2024

Associated Software Descriptions

Name Description
FakeUpdates (Citation: Red Canary SocGholish March 2024)

Techniques Used

Domain ID Name Use
Enterprise T1059 .007 Command and Scripting Interpreter: JavaScript

The SocGholish payload is executed as JavaScript.(Citation: SocGholish-update)(Citation: SentinelOne SocGholish Infrastructure November 2022)(Citation: Red Canary SocGholish March 2024)(Citation: Secureworks Gold Prelude Profile)

Enterprise T1074 .001 Data Staged: Local Data Staging

SocGholish can send output from `whoami` to a local temp file using the naming convention `rad<5-hex-chars>.tmp`.(Citation: Red Canary SocGholish March 2024)

Enterprise T1048 .003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol

SocGholish can exfiltrate data directly to its C2 domain via HTTP.(Citation: Red Canary SocGholish March 2024)

Enterprise T1036 .005 Masquerading: Match Legitimate Name or Location

SocGholish has been named `AutoUpdater.js` to mimic legitimate update files.(Citation: SocGholish-update)

Enterprise T1027 .013 Obfuscated Files or Information: Encrypted/Encoded File

The SocGholish JavaScript payload has been delivered within a compressed ZIP archive.(Citation: Red Canary SocGholish March 2024)(Citation: Secureworks Gold Prelude Profile) SocGholish has also single or double Base-64 encoded references to its second-stage server URLs.(Citation: SentinelOne SocGholish Infrastructure November 2022)

Enterprise T1566 .002 Phishing: Spearphishing Link

SocGholish has been spread via emails containing malicious links.(Citation: SocGholish-update)

Enterprise T1204 .001 User Execution: Malicious Link

SocGholish has lured victims into interacting with malicious links on compromised websites for execution.(Citation: SocGholish-update)

Groups That Use This Software

ID Name References
G1020 Mustard Tempest

(Citation: SocGholish-update) (Citation: Microsoft Ransomware as a Service) (Citation: Secureworks Gold Prelude Profile)

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.