Pass the Hash攻擊: 利用腳本中的hash table執行Pass the Hash攻擊。
使用WMI在遠端系統上執行惡意指令。
RDP暴力破解。
攻擊來源資訊:
Potential C2:
27.102.107[.]41
Potential Brute Force:
113.140.80[.]197 - Port Scanning/Brute force (CN)
120.253.228[.]35 - Port Scanning/Brute force port 3389 (CN)
112.133.236[.]187 - Brute Force port 445 (India)
58.62.125[.]245 - Brute Force port 445/Port Scanning (CN)
Potential Scanning:
58.221.24[.]178 - Port Scanning (CN)
221.4.152[.]250 - Port Scanning port 1433 (CN)
182.140.217[.]226 - Port scanning (CN)
1.202.15[.]246 - Port scanning port 3389 (CN)
Additionally the following are potential host indicators:
Scheduled task named Rtsa
Listening port of 65529
Service with a randomly generated name
Mutexes within PowerShell called LocalIf and LocalMn