Track Common Adversary Tasks Performed Using BADFLICK

 




To know more about it, you can go through my detailed document by clicking here








Overview

BADFLICK is used as a backdoor by Leviathan via spear phishing campaigns that generally targets U.S. engineering and maritime industries. Although it can't survive a reboot, but can open a reverse shell connection to its C2 server in order to download as well as execute the other malwares.

Capabilities

 After successfully launching itself into the network, BADFLICK can steal following information:

  • Basic PC information such as PC name, OS version, processor, memory, etc.
  • User account credentials
  • Network information like IP address, routing table, port usage information, ARP list, etc.
  • List of running processes as well as services
  • Folders and files within Program Files, Programs in the Start menu, and List of recent files, etc.

This backdoor can also receive commands from the C2 server in order to download and run extra modules or perform whatever task the attacker wish to do.


Remedy

It is highly recommended to patch your public-facing network and use Mimikatz defense guide along with the other defensive techniques in order to improve your defensive stance as well as minimize its impact to your various operations. 















To know more about it, you can go through my detailed document by clicking here



































Comments

Popular posts from this blog

Query, Visualize, & Monitor Data in Azure Sentinel

Planning for Implementing SAP Solutions on Azure (Part 2 of 5)

Work with String Data Using KQL Statements