Post

SOC Investigation: TA505 MirrorBlast Campaign

SOC Investigation: TA505 MirrorBlast Campaign

Scenario

Platform: TryHackMe (Room: Warzone 1)
Role: Tier 1 SOC Analyst
Objective: Triage a high-priority IDS alert by analyzing a provided packet capture (Zone1.pcap) to confirm Command and Control (C2) activity and identify malicious artifacts.


Executive Summary

Analysis of the provided packet capture (Zone1.pcap) identified strong indicators of a TA505-associated intrusion targeting an internal endpoint. The investigation revealed a sophisticated defense evasion strategy utilizing malicious Windows Installer packages (.msi) to deploy the MirrorBlast malware family.

The core of the attack chain involved proxy execution: bundling a signed interpreter (REBOL) within standard installers to run malicious scripts. This technique reduced detection effectiveness by blending execution into authorized process chains, mimicking Google software directories to evade signature-based tools.


1. Initial Alert Triage

The investigation began with a high-severity alert from the network intrusion detection system (IDS).

  • Alert Signature: ET MALWARE MirrorBlast CnC Activity M3
  • Compromised Host: 172.16.1.102
  • C2 Infrastructure: 169.239.128.11
  • Vector: TCP Port 80 (HTTP)

2. Analytical Findings

Staging and Evasion

The adversary utilized a multi-stage download process to pull down the MirrorBlast loader. The compromised endpoint communicated with two staging servers to download distinct installer files:

  1. filter.msi (hosted on 185.10.68.235)
  2. 10opd3r_load.msi (hosted on 192.36.27.92)

The REBOL Abuse Angle

The most significant finding was the use of the legitimate REBOL View 2.7.8.3.1 interpreter. Packet analysis revealed an anomalous HTTP User-Agent string originating from the host, confirming that this non-standard software engine was being used to stage further payloads.

Host Masquerading

By extracting the HTTP streams, I identified the target directories for the dropped payloads. The adversary used a masquerading technique to blend in with legitimate system files:

  • Path 1: C:\ProgramData\001\ (containing arab.exe)
  • Path 2: C:\ProgramData\Local\Google\ (containing the REBOL interpreter and the malicious exemple.rb script)

Execution Logic: Evidence suggests the installer invokes the REBOL engine to execute the script: rebol-view-278-3-1.exe -w -i -s C:/ProgramData/Local/Google/exemple.rb


3. Indicators of Compromise (IoCs)

Network

  • C2 Server: 169.239.128.11 (fidufagios[.]com)
  • Staging: 185.10.68.235, 192.36.27.92
  • User-Agent: REBOL View 2.7.8.3.1

Host

  • C:\ProgramData\001\arab.exe
  • C:\ProgramData\Local\Google\rebol-view-278-3-1.exe
  • C:\ProgramData\Local\Google\exemple.rb

4. MITRE ATT&CK Mapping


5. Impact & Recommendations

This investigation identified a high-confidence intrusion scenario consistent with TA505 activity.

Recommended Actions:

  1. Immediate Containment: Isolate host 172.16.1.102 and block all identified IoCs at the network perimeter.
  2. Remediation: Purge all identified artifacts in ProgramData.
  3. Detection Engineering: Develop hunts for non-standard interpreters (REBOL, AutoIt, etc.) communicating externally or executing from user-writable directories.

These findings highlight the need for behavior-based detection focused on unusual interpreter execution from user-writable directories and anomalous HTTP beaconing patterns.

This post is licensed under CC BY 4.0 by the author.