Hunting for Implant
Last updated
Was this helpful?
Last updated
Was this helpful?
(Great article shows how reading the C2 code can help to develop detection and hunt for the implant)
There are network parts and there are host parts, which can all be used to hunt for Threat Actor's Implants, either by network behavior, IOC, or TTP of that implant. So I think: "Hey, the threat actor when I read DFIR report or any report besides nation-state threat actors always use a custom known implant, would it be cool if I study their behavior and then point out what is special about it" -> This question is kinda stupid in my opinion, not cost-effective and time effective either. So here we are, trying to learn one or 2 implants in order to get the hang of it, the hunting implant process