← Back to Cybersecurity News Center
Severity
HIGH
CVSS
7.5
Priority
0.675
×
Tip
Pick your view
Analyst for full detail, Executive for the short version, or Plain & Simple if you are not a tech person.
Analyst
Executive
Plain & Simple
Executive Summary
Elastic Security Labs has identified TCLBanker, a banking trojan targeting 59 financial platforms across banking, fintech, and cryptocurrency sectors. The malware spreads itself by hijacking victims' active WhatsApp Web and Microsoft Outlook sessions to send malicious links to contacts, dramatically amplifying its reach beyond the initial infection vector. Organizations with employees accessing financial platforms or using browser-based messaging face credential theft, account takeover, and potential lateral movement into corporate financial systems.
Plain & Simple
Here’s what you need to know.
No jargon. Just the basics.
👤
Are you affected?
Probably, if you use online banking or a cryptocurrency app and recently installed software from an unofficial website.
🔓
What got out
Suspected: banking and financial account login details
Suspected: messages sent from your WhatsApp or email without your knowledge
Suspected: passwords saved in your browser
✅
Do this now
1 Change your passwords for any banking, crypto, or money apps you use.
2 Check your WhatsApp and email sent folders for messages you did not send.
3 Only download software from the official website of the company that made it.
👀
Watch for these
Friends saying they got a strange link from you that you did not send.
Unexpected login alerts from your bank or money apps.
Money transfers or account activity you do not recognize.
🌱
Should you worry?
This is serious if you recently installed unknown software and use online banking. If you have not installed new software recently, your risk is low right now.
Want more detail? Switch to the full analyst view →
Impact Assessment
CISA KEV Status
Not listed
Threat Severity
HIGH
High severity — prioritize for investigation
Actor Attribution
HIGH
TCLBanker operators (unattributed), Maverick/Sorvepotel family (predecessor)
TTP Sophistication
HIGH
18 MITRE ATT&CK techniques identified
Detection Difficulty
HIGH
Multiple evasion techniques observed
Target Scope
INFO
Logitech AI Prompt Builder (trojanized MSI installer), Microsoft Outlook, WhatsApp Web (Chromium-based), Chromium-based browsers, 59 unnamed banking/fintech/cryptocurrency platforms
Are You Exposed?
⚠
Your industry is targeted by TCLBanker operators (unattributed), Maverick/Sorvepotel family (predecessor) → Heightened risk
⚠
You use products/services from Logitech AI Prompt Builder (trojanized MSI installer) → Assess exposure
⚠
18 attack techniques identified — review your detection coverage for these TTPs
✓
Your EDR/XDR detects the listed IOCs and TTPs → Reduced risk
✓
You have incident response procedures for this threat type → Prepared
Assessment estimated from severity rating and threat indicators
Business Context
If TCLBanker reaches an employee endpoint, it can drain access to corporate banking, fintech, and cryptocurrency accounts by capturing credentials and hijacking active sessions before security teams detect the intrusion. The self-propagation mechanism is particularly damaging for enterprises: the malware sends malicious links from legitimate employee accounts to internal colleagues and external partners, creating reputational exposure and potential liability when trusted communication channels become attack vectors. Organizations in or transacting with Latin American markets face elevated near-term risk, but the LATAM trojan family's documented history of geographic expansion means this threat should be treated as a global enterprise concern, not a regional one.
You Are Affected If
Employees installed the trojanized Logitech AI Prompt Builder MSI from a non-official source or received it via a software distribution channel without integrity verification
Endpoints access banking, fintech, or cryptocurrency platforms via Chromium-based browsers (Chrome, Edge) with active authenticated sessions
Microsoft Outlook is used via web or desktop client on endpoints without browser session isolation controls
Endpoint protection does not alert on DLL side-loading from MSI installer directories or unsigned DLL loads
System locale is configured for Brazil, or geo-fencing controls are not considered a reliable defense boundary for your risk posture
Board Talking Points
A banking trojan targeting 59 financial platforms is spreading by hijacking employees' own email and messaging accounts to send malicious links to colleagues and partners.
Security teams should immediately verify that no unauthorized software installations occurred on endpoints with access to corporate financial accounts and enforce re-authentication on those accounts within 24 to 48 hours.
Without action, a single compromised endpoint could result in unauthorized access to corporate financial accounts, mass distribution of malware to business contacts, and reputational damage from legitimate accounts sending malicious content.
PCI-DSS — trojan targets financial platforms including banking and fintech; credential and session theft from these environments directly implicates cardholder data environment access controls
GLBA — financial institutions and their service providers face data security obligations if employee credentials to covered financial systems are compromised
LGPD (Brazil) — current geo-fencing targets Brazil-locale systems; organizations subject to Brazil's data protection law face notification obligations if customer or employee financial data is accessed
Technical Analysis
TCLBanker is a banking trojan attributed to operators linked to the Maverick/Sorvepotel LATAM family, distributed via a trojanized Logitech AI Prompt Builder MSI installer.
The installer uses DLL side-loading (T1574.002 , CWE-506) to load malicious code without triggering standard endpoint detection.
Post-installation, the malware establishes WebSocket-based C2 (T1071.002 ) for remote operator control and executes autonomous propagation by hijacking active WhatsApp Web browser sessions and Microsoft Outlook accounts (T1534 , T1078 ) to distribute malicious links to victim contacts.
Additional capabilities include keylogging (T1056.001 ), form grabbing (T1056.004 ), screen capture (T1113 ), credential harvesting from browsers (T1555.003 ), session cookie theft (T1539 ), process discovery (T1057 ), and Windows Command Shell execution (T1059.003 ). Geo-fencing logic (T1614.001 , T1497.001 ) currently restricts active payload execution to Brazil-locale systems, consistent with LATAM trojan tradecraft ahead of geographic expansion. No CVE has been assigned. Provisionally associated CWEs: CWE-506 (Embedded Malicious Code), CWE-494 (Download of Code Without Integrity Check), CWE-357 (Insufficient UI Warning of Dangerous Operations). No vendor patch exists; the trojanized installer is not from Logitech's official distribution channels. Primary research source: Elastic Security Labs.
Action Checklist IR ENRICHED
Triage Priority:
IMMEDIATE
Escalate immediately if any of the 59 targeted banking, fintech, or cryptocurrency platform credentials are confirmed stolen, if Outlook or WhatsApp Web mass-send activity is detected indicating active propagation to external contacts (triggering potential breach notification obligations under GLBA, PCI DSS, or applicable state privacy law), or if the responding team lacks EDR visibility into browser process behavior and cannot confirm session token theft did not occur.
1
Containment: Block execution of unsigned or unverified MSI installers using application control policies (Windows Defender Application Control or equivalent). Alert on or block any Logitech AI Prompt Builder installation activity that did not originate from Logitech's official download portal. Isolate any endpoint where the trojanized installer is detected.
IR Detail
Containment
NIST 800-61r3 §3.3 — Containment Strategy
NIST IR-4 (Incident Handling)
NIST SI-3 (Malicious Code Protection)
NIST CM-7 (Least Functionality) — restrict installer execution to signed, authorized packages
CIS 2.3 (Address Unauthorized Software)
CIS 4.6 (Securely Manage Enterprise Assets and Software)
Compensating Control
Deploy a WDAC policy in audit mode first using PowerShell: `New-CIPolicy -FilePath C:\policy.xml -Level Publisher -ScanPath C:\Windows\System32` then switch to enforce mode after baselining. For endpoints without WDAC, use Sysmon Event ID 11 (FileCreate) filtered on *.msi drops outside of %ProgramFiles% or sanctioned staging paths. Write a Sigma rule matching: `Image: '*\msiexec.exe' CommandLine: '*LogitechAIPromptBuilder*'` and run against Windows Event Log via PowerShell `Get-WinEvent`.
Preserve Evidence
Before isolating: capture the full MSI file hash (SHA-256 via `Get-FileHash`), the installer's working directory contents for dropped DLLs consistent with side-loading (look for DLLs co-located with the MSI or in %TEMP%\LogitechAI\), Windows Security Event ID 4688 (Process Creation) showing msiexec.exe ancestry, and Prefetch files at C:\Windows\Prefetch\MSIEXEC.EXE-*.pf confirming execution timestamp. Preserve the trojanized MSI intact before removal.
2
Detection: Hunt for DLL side-loading patterns associated with the MSI installer: unexpected DLLs loaded from the installer's working directory. Monitor for anomalous WebSocket connections from browser processes (chrome.exe, msedge.exe) to non-standard endpoints. Review Outlook send logs and WhatsApp Web session activity for mass-contact outreach from individual accounts. Elastic Security Labs published behavioral indicators in their research, prioritize those signatures in your EDR and SIEM.
IR Detail
Detection & Analysis
NIST 800-61r3 §3.2 — Detection and Analysis
NIST SI-4 (System Monitoring)
NIST AU-6 (Audit Record Review, Analysis, and Reporting)
NIST AU-12 (Audit Record Generation)
CIS 8.2 (Collect Audit Logs)
MITRE ATT&CK T1574.002 (DLL Side-Loading)
MITRE ATT&CK T1539 (Steal Web Session Cookie)
MITRE ATT&CK T1566.002 (Phishing: Spearphishing Link via existing session hijack)
Compensating Control
Enable Sysmon with a config including Event ID 7 (ImageLoad) to capture DLLs loaded by msiexec.exe or the Logitech AI Prompt Builder process that originate from non-standard paths (flag any DLL loaded from %TEMP%, %APPDATA%, or the installer staging directory). For WebSocket detection without a SIEM, use Wireshark capture filter `tcp.port == 443 && (http.upgrade == "websocket")` on a network tap or the affected host, then filter destination IPs against known Chromium CDN ranges — flag outliers. For Outlook mass-send detection, run: `Get-MessageTrackingLog -EventId SEND -Start (Get-Date).AddHours(-24) | Group-Object Sender | Sort Count -Descending` on Exchange or export .pst sent items and count recipients per message via PowerShell.
Preserve Evidence
Sysmon Event ID 7 logs showing the specific side-loaded DLL name and path loaded by the trojanized Logitech process; Sysmon Event ID 3 (Network Connection) from chrome.exe or msedge.exe to non-Google, non-Microsoft IP ranges over port 443 representing exfiltrated session token WebSocket traffic; Microsoft Exchange message tracking logs or Outlook Sent Items folder showing bulk sends to contact list entries within a compressed timeframe (TCLBanker weaponizes existing sessions so sends will appear as the legitimate user); browser process memory or disk-cached WebSocket frames containing harvested WhatsApp Web authentication tokens.
3
Eradication: Remove any instance of the trojanized Logitech AI Prompt Builder MSI. Terminate and rotate all active browser sessions for affected users, specifically WhatsApp Web and Outlook Web Access tokens. Force re-authentication and invalidate session cookies for compromised accounts (T1539 mitigation). Revoke and reissue credentials for any financial platform accounts accessible from affected endpoints.
IR Detail
Eradication
NIST 800-61r3 §3.4 — Eradication
NIST IR-4 (Incident Handling)
NIST SI-2 (Flaw Remediation)
NIST AC-12 (Session Termination) — force termination of compromised browser sessions
NIST IA-5 (Authenticator Management) — revoke and reissue credentials
CIS 5.1 (Establish and Maintain an Inventory of Accounts)
CIS 6.2 (Establish an Access Revoking Process)
MITRE ATT&CK T1539 (Steal Web Session Cookie) — mitigation
Compensating Control
For session invalidation without enterprise SSO tooling: on the affected host run `Remove-Item -Path 'C:\Users\<user>\AppData\Local\Google\Chrome\User Data\Default\Cookies' -Force` and equivalent for Edge at `C:\Users\<user>\AppData\Local\Microsoft\Edge\User Data\Default\Cookies` — this forces WhatsApp Web and OWA to require full re-authentication on next launch. For the 59 targeted financial platforms, manually trigger 'log out all sessions' or 'revoke all tokens' from each platform's security settings page. Use osquery query `SELECT path, name, value FROM browser_plugins WHERE browser_type='chrome'` to identify any malicious extensions TCLBanker may have installed to persist session access. Verify MSI removal with `Get-Package | Where-Object {$_.Name -like '*Logitech*AI*'}` and confirm no residual DLLs in the installer working directory.
Preserve Evidence
Before wiping cookies: export and preserve the browser cookie store (SQLite database at the paths above) as forensic evidence of which platforms' session tokens were present and potentially harvested; capture a process list snapshot (`Get-Process | Select-Object Name, Id, Path`) showing any TCLBanker-associated processes still running; document all financial platform account identifiers visible in browser history (`C:\Users\<user>\AppData\Local\Google\Chrome\User Data\Default\History` SQLite) to scope which of the 59 targeted platforms require credential rotation.
4
Recovery: Verify no persistence mechanisms remain: check scheduled tasks, registry run keys, and startup entries consistent with T1547. Confirm no unauthorized forwarding rules exist in affected Outlook accounts. Monitor outbound communications from recovered endpoints for 30 days. Notify contacts of affected users that malicious links may have been sent from legitimate accounts.
IR Detail
Recovery
NIST 800-61r3 §3.5 — Recovery
NIST IR-4 (Incident Handling)
NIST SI-7 (Software, Firmware, and Information Integrity) — verify restored system integrity
NIST AU-6 (Audit Record Review, Analysis, and Reporting) — sustained monitoring post-recovery
NIST CP-10 (System Recovery and Reconstitution)
CIS 7.1 (Establish and Maintain a Vulnerability Management Process)
MITRE ATT&CK T1547 (Boot or Logon Autostart Execution) — persistence check
MITRE ATT&CK T1114.003 (Email Collection: Email Forwarding Rule)
Compensating Control
Enumerate persistence with: `Get-ScheduledTask | Where-Object {$_.TaskPath -notlike '\Microsoft\*'} | Select TaskName, TaskPath` for non-Microsoft scheduled tasks; `reg query HKCU\Software\Microsoft\Windows\CurrentVersion\Run` and `HKLM\Software\Microsoft\Windows\CurrentVersion\Run` for run keys; and `Get-CimInstance Win32_StartupCommand` for startup entries — flag any entry referencing the Logitech AI Prompt Builder path or unsigned binaries in user-writable directories. For Outlook forwarding rules, run: `Get-InboxRule -Mailbox <user> | Select Name, ForwardTo, ForwardAsAttachmentTo, RedirectTo` via Exchange PowerShell. For 30-day monitoring without a SIEM, schedule a daily Sysmon Event ID 3 log review filtering chrome.exe and msedge.exe connections against a blocklist of the C2 IPs published in Elastic's TCLBanker indicators.
Preserve Evidence
Autorun entries from the registry paths above captured before and after eradication to confirm removal; Outlook inbox rule export showing the pre-eradication state to document whether TCLBanker installed forwarding rules to a threat-actor-controlled address; Sysmon Event ID 1 (Process Creation) logs from the 30-day monitoring window to detect any TCLBanker re-execution or re-installation attempt; outbound DNS query logs for the 30-day window to detect beacon or C2 re-contact from the recovered endpoint.
5
Post-Incident: This campaign exposed gaps in installer verification, browser session isolation, and outbound communication monitoring. Enforce code-signing requirements for all MSI installers. Implement conditional access policies requiring re-authentication before accessing financial platforms from corporate endpoints. Given the documented LATAM trojan pattern of geographic expansion, extend monitoring beyond Brazil-locale triggers, geo-fencing is an operator control, not a reliable defense boundary.
IR Detail
Post-Incident
NIST 800-61r3 §4 — Post-Incident Activity
NIST IR-4 (Incident Handling) — update playbook based on lessons learned
NIST IR-8 (Incident Response Plan) — revise plan to address installer verification and session isolation gaps
NIST SI-2 (Flaw Remediation) — formalize code-signing enforcement as a flaw remediation control
NIST SI-7 (Software, Firmware, and Information Integrity) — enforce code-signing via integrity verification
NIST AC-17 (Remote Access) — conditional access policies for financial platform access
CIS 2.2 (Ensure Authorized Software is Currently Supported)
CIS 6.3 (Require MFA for Externally-Exposed Applications)
CIS 7.1 (Establish and Maintain a Vulnerability Management Process)
Compensating Control
For code-signing enforcement without enterprise PKI: configure WDAC Publisher rules to block unsigned MSIs: `New-CIPolicyRule -DriverFilePath <path> -Level Publisher` and audit via Sysmon Event ID 11 filtered on .msi extensions dropped outside sanctioned directories. For conditional access without Azure AD Premium or equivalent: implement a browser extension policy via Group Policy (`HKLM\Software\Policies\Google\Chrome\ExtensionInstallAllowlist`) permitting only vetted extensions, and enforce a manual re-authentication requirement for financial platform bookmarks via a pinned internal portal page with session timeout set to 15 minutes. Document the LATAM geographic expansion pattern from the Elastic TCLBanker report in your threat intelligence feed and create a Sigma rule matching the specific WebSocket C2 communication pattern against any IP geolocation outside previously observed TCLBanker infrastructure — not just Brazil.
Preserve Evidence
Lessons-learned documentation citing the specific Elastic Security Labs TCLBanker research report as the triggering intelligence source; a gap analysis comparing pre-incident WDAC policy scope against the unsigned Logitech AI Prompt Builder MSI execution path; Outlook audit logs confirming the volume of malicious outreach sent from compromised accounts (quantify blast radius for breach notification scoping); browser extension inventory from all affected endpoints to confirm no TCLBanker-installed extensions persist post-recovery.
Recovery Guidance
After eradication, validate that all browser cookie stores on affected endpoints have been cleared and that re-authentication to WhatsApp Web and Outlook Web Access produces new, clean session tokens with no evidence of concurrent active sessions from unknown IP addresses. Monitor Exchange send logs and browser WebSocket connections daily for 30 days using the Elastic TCLBanker behavioral indicators, as TCLBanker's propagation mechanism means secondary infections among notified contacts may generate new inbound incidents referencing the original victim's identity. Contact all financial platform account security teams for the 59 targeted platforms where credentials were accessible from affected endpoints to request account activity review for the window between estimated initial infection and containment.
Key Forensic Artifacts
Trojanized Logitech AI Prompt Builder MSI file and its installer working directory: capture SHA-256 hash and all co-located DLLs consistent with T1574.002 side-loading before removal — the specific DLL name and load path is the primary indicator linking the installer to TCLBanker.
Chromium browser Cookie SQLite database (C:\Users\<user>\AppData\Local\Google\Chrome\User Data\Default\Cookies and equivalent Edge path): contains harvested session cookies for the 59 targeted financial platforms, WhatsApp Web authentication tokens, and OWA session identifiers — the direct evidence of what TCLBanker exfiltrated.
Sysmon Event ID 3 (Network Connection) logs from chrome.exe and msedge.exe processes: WebSocket connections to non-standard endpoints are the network-layer signature of TCLBanker's C2 exfiltration of browser session tokens; correlate destination IPs against Elastic's published TCLBanker infrastructure indicators.
Microsoft Exchange message tracking logs or Outlook Sent Items folder export: documents the exact contacts and external domains targeted by TCLBanker's Outlook-based propagation, scopes breach notification obligations, and identifies secondary victims who received malicious links from the compromised account.
Windows Registry Run keys (HKCU and HKLM \Software\Microsoft\Windows\CurrentVersion\Run) and scheduled task XML exports from C:\Windows\System32\Tasks\: TCLBanker persistence artifacts that would survive a browser cookie wipe; absence of entries here after eradication is required before clearing the endpoint for return to service.
Detection Guidance
Focus detection on three behavioral clusters.
First, DLL side-loading at installation: monitor for DLLs loaded from %TEMP% or installer staging directories by msiexec.exe or newly spawned processes.
Second, WebSocket-based C2: flag persistent WebSocket connections (wss://) initiated by browser helper processes or injected browser threads to endpoints with no established business context.
Third, autonomous propagation: alert on bulk outbound message activity from Outlook (Exchange transport logs, high send-volume anomalies per mailbox) and WhatsApp Web (browser DOM manipulation patterns or automated HTTP POST sequences to web.whatsapp.com outside normal usage hours). Additional behavioral indicators: keylogger artifacts (raw input hooks), screen capture API calls from non-UI processes, and credential access attempts against browser credential stores (T1555.003 ). Elastic Security Labs' published research contains specific behavioral signatures and should be the primary source for rule construction. MITRE techniques to prioritize in detection rules: T1574.002 , T1534 , T1539 , T1056.001 , T1056.004 , T1555.003 .
Indicators of Compromise (2)
Export as
Splunk SPL
KQL
Elastic
Copy All (2)
1 url
1 domain
Type Value Enrichment Context Conf.
🔗 URL
Trojanized Logitech AI Prompt Builder MSI installer (distribution URL not publicly confirmed at time of item creation)
VT
US
Initial delivery vector — DLL side-loading payload embedded in MSI
HIGH
⌘ DOMAIN
See Elastic Security Labs research publication for confirmed C2 indicators
VT
US
WebSocket-based C2 infrastructure — specific domains published in Elastic report
HIGH
Platform Playbooks
Microsoft Sentinel / Defender
CrowdStrike Falcon
AWS Security
🔒
Microsoft 365 E3
3 log sources
Basic identity + audit. No endpoint advanced hunting. Defender for Endpoint requires separate P1/P2 license.
🛡
Microsoft 365 E5
18 log sources
Full Defender suite: Endpoint P2, Identity, Office 365 P2, Cloud App Security. Advanced hunting across all workloads.
🔍
E5 + Sentinel
27 log sources
All E5 tables + SIEM data (CEF, Syslog, Windows Security Events, Threat Intelligence). Analytics rules, playbooks, workbooks.
Hard indicator (direct match)
Contextual (behavioral query)
Shared platform (review required)
IOC Detection Queries (1)
1 URL indicator(s).
KQL Query Preview
Read-only — detection query only
// Threat: TCLBanker Banking Trojan Weaponizes Victims’ Own Accounts to Spread via Wh
let malicious_urls = dynamic(["Trojanized Logitech AI Prompt Builder MSI installer (distribution URL not publicly confirmed at time of item creation)"]);
DeviceNetworkEvents
| where Timestamp > ago(30d)
| where RemoteUrl has_any (malicious_urls)
| project Timestamp, DeviceName, RemoteUrl, RemoteIP,
InitiatingProcessFileName, InitiatingProcessCommandLine
| sort by Timestamp desc
MITRE ATT&CK Hunting Queries (7)
Sentinel rule: LOLBin abuse (mshta, regsvr32, rundll32)
KQL Query Preview
Read-only — detection query only
DeviceProcessEvents
| where Timestamp > ago(7d)
| where FileName in~ ("mshta.exe", "regsvr32.exe", "rundll32.exe", "certutil.exe", "cmstp.exe", "msiexec.exe")
| where ProcessCommandLine has_any ("http", "ftp", "\\\\", "javascript:", "vbscript:", "scrobj.dll", "/i:", "-decode", "-urlcache")
| project Timestamp, DeviceName, FileName, ProcessCommandLine, AccountName, InitiatingProcessFileName
| sort by Timestamp desc
Sentinel rule: Persistence via registry / startup
KQL Query Preview
Read-only — detection query only
DeviceRegistryEvents
| where Timestamp > ago(7d)
| where ActionType in ("RegistryValueSet", "RegistryKeyCreated")
| where RegistryKey has_any ("\\CurrentVersion\\Run", "\\CurrentVersion\\RunOnce", "\\Winlogon\\", "\\Services\\")
| where RegistryValueData has_any (".exe", ".dll", ".bat", ".ps1", ".vbs", "cmd", "powershell", "http")
| project Timestamp, DeviceName, RegistryKey, RegistryValueName, RegistryValueData, InitiatingProcessFileName
| sort by Timestamp desc
Sentinel rule: Unusual C2 communication patterns
KQL Query Preview
Read-only — detection query only
DeviceNetworkEvents
| where Timestamp > ago(7d)
| where RemotePort in (80, 443, 8080, 8443)
| where InitiatingProcessFileName !in~ ("chrome.exe", "msedge.exe", "firefox.exe", "teams.exe", "outlook.exe", "svchost.exe")
| summarize Connections = count() by DeviceName, RemoteIP, InitiatingProcessFileName
| where Connections > 50
| sort by Connections desc
Sentinel rule: Sign-ins from unusual locations
KQL Query Preview
Read-only — detection query only
SigninLogs
| where TimeGenerated > ago(7d)
| where ResultType == 0
| summarize Locations = make_set(Location), LoginCount = count(), DistinctIPs = dcount(IPAddress) by UserPrincipalName
| where array_length(Locations) > 3 or DistinctIPs > 5
| sort by DistinctIPs desc
Sentinel rule: Phishing email delivery
KQL Query Preview
Read-only — detection query only
EmailEvents
| where Timestamp > ago(7d)
| where ThreatTypes has "Phish" or DetectionMethods has "Phish"
| summarize Attachments = make_set(AttachmentCount), Urls = make_set(UrlCount) by NetworkMessageId, Timestamp, SenderFromAddress, RecipientEmailAddress, Subject, DeliveryAction, DeliveryLocation, ThreatTypes
| sort by Timestamp desc
Sentinel rule: Suspicious PowerShell command line
KQL Query Preview
Read-only — detection query only
DeviceProcessEvents
| where Timestamp > ago(7d)
| where FileName in~ ("powershell.exe", "pwsh.exe", "cmd.exe", "wscript.exe", "cscript.exe", "mshta.exe")
| where ProcessCommandLine has_any ("-enc", "-nop", "bypass", "hidden", "downloadstring", "invoke-expression", "iex", "frombase64", "new-object net.webclient")
| project Timestamp, DeviceName, FileName, ProcessCommandLine, AccountName, InitiatingProcessFileName
| sort by Timestamp desc
Sentinel rule: Lateral movement via RDP / SMB / WinRM
KQL Query Preview
Read-only — detection query only
DeviceNetworkEvents
| where Timestamp > ago(7d)
| where RemotePort in (3389, 5985, 5986, 445, 135)
| where LocalIP != RemoteIP
| summarize ConnectionCount = count(), TargetDevices = dcount(RemoteIP) by DeviceName, InitiatingProcessFileName
| where ConnectionCount > 10 or TargetDevices > 3
| sort by TargetDevices desc
Falcon API IOC Import Payload (1 indicators)
POST to /indicators/entities/iocs/v1 — Weak/benign indicators pre-filtered. Expiration set to 90 days.
Copy JSON
[
{
"type": "domain",
"value": "See Elastic Security Labs research publication for confirmed C2 indicators",
"source": "SCC Threat Intel",
"description": "WebSocket-based C2 infrastructure \u2014 specific domains published in Elastic report",
"severity": "high",
"action": "detect",
"platforms": [
"windows",
"mac",
"linux"
],
"applied_globally": true,
"expiration": "2026-08-09T00:00:00Z"
}
]
Route 53 DNS — Malicious Domain Resolution
Query Preview
Read-only — detection query only
fields @timestamp, qname, srcaddr, rcode
| filter qname in ["See Elastic Security Labs research publication for confirmed C2 indicators"]
| sort @timestamp desc
| limit 200
Compliance Framework Mappings
T1497.001
T1574.002
T1113
T1218.007
T1547
T1614.001
+12
CM-7
SI-3
SI-4
AC-2
AC-6
IA-2
+6
MITRE ATT&CK Mapping
T1113
Screen Capture
collection
T1547
Boot or Logon Autostart Execution
persistence
T1614.001
System Language Discovery
discovery
T1057
Process Discovery
discovery
T1071.002
File Transfer Protocols
command-and-control
T1534
Internal Spearphishing
lateral-movement
T1078
Valid Accounts
defense-evasion
T1555.003
Credentials from Web Browsers
credential-access
T1539
Steal Web Session Cookie
credential-access
T1566.001
Spearphishing Attachment
initial-access
T1021.006
Windows Remote Management
lateral-movement
Guidance Disclaimer
The analysis, framework mappings, and incident response recommendations in this intelligence
item are derived from established industry standards including NIST SP 800-61, NIST SP 800-53,
CIS Controls v8, MITRE ATT&CK, and other recognized frameworks. This content is provided
as supplemental intelligence guidance only and does not constitute professional incident response
services. Organizations should adapt all recommendations to their specific environment, risk
tolerance, and regulatory requirements. This material is not a substitute for your organization's
official incident response plan, legal counsel, or qualified security practitioners.
View All Intelligence →