1. Dump LSASS via #CobaltStrike, RDP, Mimikatz 2. AnyDesk install/exec 3. Scheduled task and wmic exec 4. AdFind! The same script we've been seeing since 2019
2,3,4 AD info, PowerView, Mimikatz, DCSync, Cobalt Strike, Get-ADComputer, ShareFinder, and so much more.
So this is why we see soooo much programdata. Its hard coded all over.
1. Tor/Whonix setup 2. Bash script to sort AdFind results 3. PsExec and Wmic exec commands/instructions 4. Operating CVE-2020-1472 Zerologon in Cobalt Strike
1. Ransomware exec on Linux 2. Ngrok setup for RDP tunneling
3/4. Using #CobaltStrike to exec nltest, net, PowerView, dump hashes, enable rdp, disable Defender, nltest, etc.
1. Change RDP port 2. Brute force instructions (seasons and year, this sounds familiar)
3/4. Getting Domain Admin via SMB brute force - net, Invoke-SMBAutoBrute
1/2/3/4 Hunting backup admins
➡️"If it is not clear who this is after the survey, see adfind + check linkedin"
Here's a thread on some of the interesting things we've seen in the #ContiLeaks.
If you would like to read the chat logs and TrickBot Forum information, @Kostastsale has translated them to English here: github.com/tsale/translat…. He will be adding more as things get leaked.
New chat logs from the 26 Feb to the 28 Feb were released. It included an entertaining exchange where the user "pumba" was not happy with their work partner "tramp" (also referred to as “trump”). “Pumba” ends the conversation by asking to be moved to another team. #ContiLeaks
Leaked Bazar Bot panels show hundreds of past infected clients. Entries contain comments that include reconnaissance of revenue, and tracking work to be done. #ContiLeaks