APT Attachs
APT Attachs
APT Attachs
APT tools utilize normal everyday functions native within the operating system
and hide in the file system “in plain sight.”
Do not want to impede or interrupt the normal system operations of the hosts
they compromise
The most popular technique used by APT groups to gain access to target
networks is spear-phishing
The exfiltration of data may be “drip fed” or “fire hosed” out, the
This notice is mailed to you with regard to the Bank payment (ID: 012832113749) that
was recently sent from your account.
The current status of the referred transfer is: ‘failed due to the technical fault’.
Please check the report below for more information:
http://finiancialservicesc0mpany.de/index.html
Kind regards,
Jessica Long
TEPA - The Electronic Payments
Association – securing your transactions
Example: Malicious E-mail
The next step involved analyzing the e-mail headers for any
leads:
Creating a service
• Memory
• Backup media
The toolkit for APT investigation
Investigators used in this case consisted of a mix of
Sysinternals and forensic tools:
• AccessData FTK Imager
• Sysinternals Autoruns
• Sysinternals Process Explorer
• Sysinternals Process Monitor
• WinMerge
• Currports
• Sysinternals Vmmap
Memory Capture
First perform a memory dump of the compromised computer
folder
restart
file creations
its C&C server via a “cutout” or proxy server. Often several proxies
are used in transit to mask the path to the actual C&C server. The
beacon is usually periodic, such as every five minutes or hours.
The attacker interacts with the Trojan backdoor via the proxy
The attacker often uses service privilege escalation for initial reconnaissance
availability.
Once the lateral access across the network is determined, the attacker
The egress points are used to collect and steal targeted proprietary