T1016 Info stealer tool Grixba
T1016 - Info stealer Grixba¶
DESCRIPTION¶
Detects custom info stealer tool Grixba used by Play ransomware It was developed by Play ransomware actors using Costura, a popular.NET development tool for embedding an application's dependencies into a single executable file
example:
Imageload log containing file name costura.commandline.dll which is used by Grixba
Related
Play ransomware
Reference:
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-352a
https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/play-ransomware-volume-shadow-copy
https://www.bleepingcomputer.com/news/security/play-ransomware-gang-uses-custom-shadow-volume-copy-data-theft-tool/
ATT&CK TACTICS¶
T1016 - System Network Configuration Discovery
Data Source(s): Module
SENTINEL RULE QUERY¶
Triage¶
- Inspect if DLL image loaded's FileName is 'costura.commandline.dll', which is used by Grixba to parse command lines
- Inspect InitiatingProcessFolderPath for any anomalies/ suspicious process
False Positive¶
Known good used by legitimate companies
VERSION¶
Version 1.0 (date: 06/02/2024)