BreadBear
BreadBear copied to clipboard
A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/
BreadBear
A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/
The goal of this project was to create my own red team campaign that would emulate some of the TTPs from the above campaign analysis. During my endeavor I decdied to switch from a complete mimick to a substitute / exclude / improve upon certain tactics that I deemed unnecessary. I will write an accompanying blog post which will be linked here once it is published.
However, here are some features which I believe are worth noting for this project:
- Initial payload delievery is done from an automatic download via a website hosted on IPFS.
- Executed Payload Dynamically resolves all sensitive functions
- Unhooks DLLs using native API's / syscalls & HellsGate technique to bypass AV/EDR.
- Deletes itself from disk while running.
- Hides console window
- Strings obfuscated - but i was super lazy w/ this since it's just a PoC. Somehow still bypasses all detection engines on antiscan.me
- Disables ETW
- Downloads a base64 encoded version of stage3 from discord CDN.
- Reflectively Loads stage3 in memory / executes to launch shell back.
- Stage3 can be swapped between a file encryptor payload or C2 implant as show in the below videos:
Stage2 downloading and executing a stage3 payload that is a Metasploit implant from discord CDN.
https://user-images.githubusercontent.com/41178870/153101973-467250a8-e291-4c93-9f81-0656a3ef00e0.mp4
Stage2 downloading and executing a stage3 payload that is a file encryptor payload from discord CDN, stage2 is still deleted from downloads folder.
https://user-images.githubusercontent.com/41178870/153102043-a8d28927-01b6-4f31-8612-2d69664892b2.mp4