Carbanak+FIN7
|
The technique was not in scope.
|
APT29
|
Step
|
ATT&CK Pattern
|
Detection Type |
Detection Note |
|
18.A.1
|
|
|
A General alert detection (low severity) called "One-Liner ML Module" was generated for a suspicious use of a scripting engine.
[1]
|
|
Telemetry showed net.exe with command-line arguments to connect to a OneDrive URL as well as net.exe subsequently making a network connection to public IPs over port 443.
[1]
|
|
An MSSP detection for "Data Theft and Exfiltration" occurred containing evidence of "One-Liner ML Module" that identified details of mapping a OneDrive URL to the Y: drive.
[1]
|
|
Mapped a network drive to an online OneDrive account using PowerShell
net.exe with command-line arguments then making a network connection to a public IP over port 443
[1]
Mapped a network drive to an online OneDrive account using PowerShell
net.exe with command-line arguments then making a network connection to a public IP over port 443
[1]
Mapped a network drive to an online OneDrive account using PowerShell
net.exe with command-line arguments then making a network connection to a public IP over port 443
[1]