{"id":16538,"date":"2023-03-31T17:44:16","date_gmt":"2023-03-31T15:44:16","guid":{"rendered":"https:\/\/www.nextron-systems.com\/?p=16538"},"modified":"2024-04-12T16:33:25","modified_gmt":"2024-04-12T14:33:25","slug":"using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/","title":{"rendered":"Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<blockquote><\/blockquote>\n<p><span>On March 29, 2023 CrowdStrike <a href=\"https:\/\/www.reddit.com\/r\/crowdstrike\/comments\/125r3uu\/20230329_situational_awareness_crowdstrike\/\">detected<\/a> malicious activity, originating from a legitimate, signed binary called 3CXDesktopApp. The binary is part of a softphone system developed by <a href=\"https:\/\/www.3cx.com\/\">3CX<\/a>.<br \/>The observed malicious activity consisted of beaconing to infrastructure controlled by the actors, leading to the deployment of second-stage payloads and in a few cases direct on-keyboard activity from the attackers.<\/span><span><\/span><\/p>\n<p>You can find more information on the threat in the following articles by CrowdStrike, Volexity and Huntress Labs:<span><\/span><\/p>\n<blockquote><\/blockquote>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;CrowdStrike Report&#8221; url=&#8221;https:\/\/www.crowdstrike.com\/blog\/crowdstrike-detects-and-prevents-active-intrusion-campaign-targeting-3cxdesktopapp-customers\/&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-31-at-13.52.35.png&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The first report on the activity linking it to LABYRINTH CHOLLIMA aka Lazarus group.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Volexity Article&#8221; url=&#8221;https:\/\/www.volexity.com\/blog\/2023\/03\/30\/3cx-supply-chain-compromise-leads-to-iconic-incident\/&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-31-at-14.42.20.png&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>This article by Volexity lists a lot of indicators and reports on the final stage in form of the stealer ICONIC<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Huntress Labs Article&#8221; url=&#8221;https:\/\/www.huntress.com\/blog\/3cx-voip-software-compromise-supply-chain-threats&#8221; image=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-31-at-14.45.05.png&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Huntress Labs report on the activity including process patterns, rules and IOCs<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>After the compromise became first known, we began our own investigation and in the following few hours released a number of detection rules to our public repositories.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-31-at-18.08.31.png&#8221; title_text=&#8221;Screenshot 2023-03-31 at 18.08.31&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>While having the detection in place is a great start, often times it&#8217;s not an easy task to assess the situation and make sure that no system in the network is affected by the threat.<\/p>\n<p>One way to leverage these rules and quickly scan your own environment for free, is using THOR Lite scanner.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><span>Enter THOR Lite<\/span><\/h1>\n<p><span>THOR Lite is the reduced version of our compromise assessment scanner THOR. It uses YARA rules and Indicators of Compromise (IOC) like hash values and file names to detect malicious activity.\u00a0<\/span><\/p>\n<p><span>In this technical blog article, we&#8217;ll explore how to levreage THOR Lite to scan end systems for signs of malicious activity related to the 3CX compromise. <\/span><\/p>\n<p><span>We&#8217;ll also discuss the various types of indicators that THOR Lite can detect, walk through the process of setting up and configuring the tool, and provide tips for interpreting the scan results.<\/span><\/p>\n<p><span>By the end of this article, you should have a solid understanding of how to use THOR Lite to run a compromise assessments within your network.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-31-at-14.51.18.png&#8221; title_text=&#8221;Screenshot 2023-03-31 at 14.51.18&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Download THOR Lite<\/h1>\n<p>Visit the <a href=\"https:\/\/www.nextron-systems.com\/thor-lite\/\" target=\"_blank\" rel=\"noopener\">product page,<\/a> subscribe to the newsletter to get the program package and the license file.<\/p>\n<p>(note: we offer a special license file to 3CX customers that enables an additional module from the full version to extend the detection coverage even more)<\/p>\n<p>You can download this special license here: (expires 30.04.2023)\u00a0<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.nextron-systems.com\/certs\/3cx.lic&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Download 3cx.lic&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-31-at-15.15.03.png&#8221; title_text=&#8221;Screenshot 2023-03-31 at 15.15.03&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Email content:<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-31-at-15.18.55.png&#8221; title_text=&#8221;Screenshot 2023-03-31 at 15.18.55&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Getting Started<\/h1>\n<p>After you&#8217;ve downloaded the program package as a ZIP archive, extract it and place the license file (.lic) in the program folder.<\/p>\n<p>Double click on the <strong>&#8220;thor64-lite.exe&#8221;<\/strong> to run it without any flags or open a Windows command line as an administrator and navigate to the folder where you&#8217;ve extracted the program package.<\/p>\n<p>You should then see the scan window that closes automatically when the scan is complete. Usually scans take between 1-4 hours, but there are some ways to speed up the scan.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-31-at-16.17.04.png&#8221; title_text=&#8221;Screenshot 2023-03-31 at 16.17.04&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-31-at-16.21.11.png&#8221; title_text=&#8221;Screenshot 2023-03-31 at 16.21.11&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Flags to Consider<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<pre>--nosoft --nolowprio<\/pre>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>If you&#8217;re scanning virtual machines or systems that are under a constant high load by other processes, it could be helpful to use the <em>&#8220;&#8211;nosoft&#8221;<\/em> and <em>&#8220;&#8211;nolowprio&#8221;<\/em> flags to let THOR run with the same process priority as any other regular process.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<pre>--lookback 150 --global-lookback<\/pre>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>If you&#8217;re interested in scanning recently created files and log entries. These flags instruct THOR to only scan elements created or changed within the last 150 days (<a href=\"https:\/\/blogs.blackberry.com\/en\/2023\/03\/initial-implants-and-network-analysis-suggest-the-3cx-supply-chain-operation-goes-back-to-fall-2022\">why 150?<\/a>). It would ignore any file or eventlog entry older than that and thus scan a much smaller set of elements.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<pre>--cpulimit 30<\/pre>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>To minimize the impact for the end user working on a system while it is getting scanned, you can reduce the CPU usage of the scanner to e.g. 30% to avoid them taking notice of the scan by reducing the overall load and fan noise.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;222.2px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Recommended CommandLine Flags For The 3CX Use Case<\/h1>\n<p>If a normal scan takes too long, we recommend the following command line flags in order to reduce the scan duration by restricting the scan to the changes of the last 150 days:<\/p>\n<pre>thor64-lite.exe --nolowprio --lookback 150 --global-lookback<\/pre>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>In order to reduce the CPU usage and make it as imperceptible as possible to the end user working on the scanned systems use the following command:<\/p>\n<pre>thor64-lite.exe --lookback 150 --global-lookback --cpulimit 35<\/pre>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Update the Signatures<\/h1>\n<p>We&#8217;re constantly working on enhancing and updating the signatures related to the 3CX compromise. Updates are to be expected over the weekend and next week. To make sure THOR always works with the newest set of signatures use the following command:<\/p>\n<pre>thor-lite-util.exe upgrade<\/pre>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Interpreting the Scan Results<\/h1>\n<p>During the scan you&#8217;ll see several messages in green and blue colours. Warning and alert messages use a yellow or red color. But don&#8217;t worry when you notice a message of that color. Remember that THOR is a scanner that highlights malicious and suspicious elements for review by an administrator or forensic analyst. Not everything shown as a &#8220;warning&#8221; message has to be a real threat.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-31-at-17.19.16.png&#8221; title_text=&#8221;Screenshot 2023-03-31 at 17.19.16&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>After the scan finishes, users can find an HTML report in the program folder that lists all findings.\u00a0<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-31-at-17.27.02.png&#8221; title_text=&#8221;Screenshot 2023-03-31 at 17.27.02&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>We recommend searching the HTML report for the &#8220;3CX&#8221; keyword and only review matches with the specific IOCs and YARA rules related to this activity.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-31-at-17.25.17.png&#8221; title_text=&#8221;Screenshot 2023-03-31 at 17.25.17&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>THOR Lite is able to detect various forensic artefacts:<\/p>\n<ul>\n<li>The installer files<\/li>\n<li>The malicious binaries<\/li>\n<li>The loaded malware in-memory<\/li>\n<li>Process connections to known C2 addresses<\/li>\n<li>Traces of activity in local log files<\/li>\n<\/ul>\n<p>We&#8217;re also offering a special license (3cx.lic) to 3CX and <a href=\"https:\/\/www.3cx.com\/community\/threads\/forensic-scanner-nextron-thor.120005\/\">their customers<\/a> that will activate a special feature called <strong>&#8220;Sigma Scanning&#8221;<\/strong> in THOR Lite instances. This allows them to apply the Sigma rules mentioned below (and 1600+ more) on the event logs of a scanned end system.<\/p>\n<p>A match with one of these Sigma rules would look like this:\u00a0<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/image-e1680276841666.png&#8221; title_text=&#8221;image&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>You can download this special license here: (expires 30.04.2023)\u00a0<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.nextron-systems.com\/certs\/3cx.lic&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Download 3cx.lic&#8221; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><span>Continuous Compromise Assessment: Enhancing Detection Capabilities to Mitigate High-Profile Cyber Attacks<\/span><\/h1>\n<p>One more time, we are all taken aback by yet another sudden high-profile compromise. Just like the Sunburst or HAFNIUM Attack, the 3CX compromise arose out of nowhere, putting companies of all kinds across the globe at risk. We may later discover that some organizations were exploited for months before the 3CX compromise was ultimately made public.<\/p>\n<p>But does it truly have to come as such a surprise to everyone? Looking back at the Hafnium attack, Nextron discovered that many organizations had been breached by various attack groups, all of whom appeared to have used the proxy shell\/proxy logon weakness. All attackers who expanded their breach brought their own toolset for persistence and post-exploitation. Nothing new so far.<\/p>\n<p>However, what if we could automatically detect an attacker&#8217;s toolkit after it has been deployed? In this case, we could efficiently detect these breaches long before day zero simply by identifying secondary tools that appear magically on a system. Let&#8217;s assume we scan our systems weekly, searching for all kinds of Indicators of Compromise, known attacker tools, or traces of their methods. Then, even without knowing that the 3CX compromise exists, we would most likely be able to detect attacks that make use of it within a week. This would give us a heads up before bad things even begin to happen, shocking everyone.<\/p>\n<p>This is precisely Nextron&#8217;s &#8220;Continuous Compromise Assessment&#8221; approach. With our orchestration platform ASGARD, we can conduct recurrent and automated compromise assessments using our full-featured Scanner THOR. Our first and initial scan represents what we call the baseline. We would analyze all events from the first scan and, starting with the next week, focus on any deviations from this baseline. In such a scenario, we would detect breaches based on secondary toolsets from one week to another. While we still would not detect the 0-day itself, the secondary toolset would show up very prominently as a deviation from the baseline.<\/p>\n<p>There is not much effort required to gain a considerable amount of additional detection capabilities.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><strong><span style=\"font-family: inherit;\">Signatures\u00a0<\/span><\/strong><\/h1>\n<p>The following listings show all the signatures we&#8217;ve made public and used in THOR Lite to detect malicious activity<\/p>\n<h3>YARA (public)<\/h3>\n<div><a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/yara\/gen_mal_3cx_compromise_mar23.yar#L3\"><span>APT_MAL_NK_3CX_Malicious_Samples_Mar23_1<\/span><\/a><\/div>\n<div><a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/yara\/gen_mal_3cx_compromise_mar23.yar#L24\"><span>APT_MAL_NK_3CX_Malicious_Samples_Mar23_2<\/span><\/a><\/div>\n<div><a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/yara\/gen_mal_3cx_compromise_mar23.yar#L47\"><span>APT_MAL_NK_3CX_Malicious_Samples_Mar23_3<\/span><\/a><\/div>\n<div><a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/yara\/gen_mal_3cx_compromise_mar23.yar#L71\"><span>SUSP_APT_MAL_NK_3CX_Malicious_Samples_Mar23_1<\/span><\/a><\/div>\n<div><a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/yara\/gen_mal_3cx_compromise_mar23.yar#LL86\"><span>APT_SUSP_NK_3CX_RC4_Key_Mar23_1<\/span><\/a><\/div>\n<div><a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/yara\/gen_mal_3cx_compromise_mar23.yar#L104\"><span>SUSP_3CX_App_Signed_Binary_Mar23_1<\/span><\/a><\/div>\n<div><a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/yara\/gen_mal_3cx_compromise_mar23.yar#LL125\"><span>SUSP_3CX_MSI_Signed_Binary_Mar23_1<\/span><\/a><\/div>\n<div><a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/yara\/gen_mal_3cx_compromise_mar23.yar#LL151\"><span>APT_MAL_macOS_NK_3CX_Malicious_Samples_Mar23_1<\/span><\/a><\/div>\n<div><a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/yara\/gen_mal_3cx_compromise_mar23.yar#LL170\"><span>APT_MAL_MacOS_NK_3CX_DYLIB_Mar23_1<\/span><\/a><\/div>\n<div><a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/yara\/gen_mal_3cx_compromise_mar23.yar#L197\"><span>APT_SUSP_NK_3CX_Malicious_Samples_Mar23_1<\/span><\/a><\/div>\n<div><a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/yara\/gen_mal_3cx_compromise_mar23.yar#L214\"><span>APT_MAL_NK_3CX_Malicious_Samples_Mar23_4<\/span><\/a><\/div>\n<div><a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/yara\/gen_mal_3cx_compromise_mar23.yar#L230\"><span>MAL_3CXDesktopApp_MacOS_Backdoor_Mar23<\/span><\/a><\/div>\n<div><a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/yara\/gen_mal_3cx_compromise_mar23.yar#LL257\"><span>APT_MAL_NK_3CX_ICONIC_Stealer_Mar23_1<\/span><\/a><\/div>\n<div><a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/yara\/gen_mal_3cx_compromise_mar23.yar#L306\"><span> MAL_3CXDesktopApp_MacOS_UpdateAgent_Mar23<\/span><\/a><\/div>\n<\/p>\n<h3>SIGMA (public)<\/h3>\n<p>Potential Compromised 3CXDesktopApp Beaconing Activity &#8211; Proxy<br \/>\nUUID: <a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/web\/proxy_generic\/proxy_malware_3cx_compromise_c2_beacon_activity.yml\">3c4b3bbf-36b4-470c-b6cf-f07e8b1c7e26<\/a><\/p>\n<p>Potential Compromised 3CXDesktopApp ICO C2 File Download<br \/>\nUUID: <a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/web\/proxy_generic\/proxy_malware_3cx_compromise_susp_ico_requests.yml \">76bc1601-9546-4b75-9419-06e0e8d10651<\/a><\/p>\n<p>Potential Compromised 3CXDesktopApp Beaconing Activity &#8211; DNS<br \/>\nUUID: <a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/windows\/dns_query\/dns_query_win_malware_3cx_compromise.yml\">bd03a0dc-5d93-49eb-b2e8-2dfd268600f8<\/a><\/p>\n<p>Potential Compromised 3CXDesktopApp Beaconing Activity &#8211; Netcon<br \/>\nUUID: <a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/windows\/network_connection\/net_connection_win_malware_3cx_compromise.yml\">51eecf75-d069-43c7-9ea2-63f75499edd4<\/a><\/p>\n<p>Potential Suspicious Child Process Of 3CXDesktopApp<br \/>\nUUID: <a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/windows\/process_creation\/proc_creation_win_malware_3cx_compromise_susp_children.yml\">63f3605b-979f-48c2-b7cc-7f90523fed88<\/a><\/p>\n<p>Malicious DLL Load By Compromised 3CXDesktopApp<br \/>\nUUID: <a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/windows\/image_load\/image_load_malware_3cx_compromise_susp_dll.yml\">d0b65ad3-e945-435e-a7a9-438e62dd48e9<\/a><\/p>\n<p>Potential Compromised 3CXDesktopApp Execution<br \/>\nUUID: <a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/windows\/process_creation\/proc_creation_win_malware_3cx_compromise_execution.yml\">93bbde78-dc86-4e73-9ffc-ff8a384ca89c<\/a><\/p>\n<p>Potential Compromised 3CXDesktopApp Update Activity<br \/>\nUUID: <a href=\"https:\/\/github.com\/SigmaHQ\/sigma\/blob\/master\/rules\/windows\/process_creation\/proc_creation_win_malware_3cx_compromise_susp_update.yml\">e7581747-1e44-4d4b-85a6-0db0b4a00f2a<\/a><\/p>\n<h3>IOCs<\/h3>\n<p>C2 IOCs<br \/>\n<a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/iocs\/c2-iocs.txt#L1813-L1835\">c2-iocs.txt @ signature-base<\/a><\/p>\n<p>Filename IOCs<br \/>\n<a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/iocs\/filename-iocs.txt#L4239-L4243\">filename-iocs.txt @ signature-base<\/a><\/p>\n<p>Hash IOCs<br \/>\n<a href=\"https:\/\/github.com\/Neo23x0\/signature-base\/blob\/master\/iocs\/hash-iocs.txt#L10767-L10786\">hash-iocs.txt @ signature-base<\/a>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;20px|auto||auto||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Full THOR Version<\/h1>\n<p>Keep in mind that THOR Lite is only a demo version of our full scanner with more than 27 detection modules and more than 20,000 YARA rues compared to the 5 modules and 2,500 rules used in THOR Lite.<\/p>\n<p>You can find a full feature comparison <a href=\"https:\/\/www.nextron-systems.com\/compare-our-scanners\/\">here<\/a> and a blog post that explains the differences in more detail <a href=\"https:\/\/www.nextron-systems.com\/2021\/12\/04\/reasons-why-to-use-thor-instead-of-thor-lite\/\">here<\/a>.\u00a0<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/Screenshot-2023-03-31-at-17.39.19.png&#8221; title_text=&#8221;Screenshot 2023-03-31 at 17.39.19&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On March 29, 2023 CrowdStrike detected malicious activity, originating from a legitimate, signed binary called 3CXDesktopApp. The binary is part of a softphone system developed by 3CX.The observed malicious activity consisted of beaconing to infrastructure controlled by the actors, leading to the deployment of second-stage payloads and in a few cases direct on-keyboard activity from the attackers. You can find more information on the threat in the following articles by CrowdStrike, Volexity and Huntress Labs: The first report on the activity linking it to LABYRINTH CHOLLIMA aka Lazarus group.This article by Volexity lists a lot of indicators and reports on the final stage in form of the stealer ICONICHuntress Labs report on the activity including process patterns, rules and IOCsAfter the compromise became first known, we began our own investigation and in the following few hours released a number of detection rules to our public repositories.While having the detection in place is a great start, often times it&#8217;s not an easy task to assess the situation and make sure that no system in the network is affected by the threat. One way to leverage these rules and quickly scan your own environment for free, is using THOR Lite scanner.Enter THOR [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":16537,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[327,316,749,1,32,248,269,47],"tags":[],"class_list":["post-16538","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alert","category-apt","category-homepage","category-nextron","category-thor","category-thor-lite","category-tutorial","category-yara"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise - Nextron Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/\"},\"author\":{\"name\":\"Florian Roth\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\"},\"headline\":\"Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise\",\"datePublished\":\"2023-03-31T15:44:16+00:00\",\"dateModified\":\"2024-04-12T14:33:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/\"},\"wordCount\":3159,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/cyb3rops_Thor_checking_a_desktop_computer_for_viruses_blue_ligh_15545217-6bf0-4dc9-9f39-f45e8a270236.png\",\"articleSection\":[\"Alert\",\"APT\",\"Homepage\",\"Nextron\",\"THOR\",\"THOR Lite\",\"Tutorial\",\"YARA\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/\",\"name\":\"Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/cyb3rops_Thor_checking_a_desktop_computer_for_viruses_blue_ligh_15545217-6bf0-4dc9-9f39-f45e8a270236.png\",\"datePublished\":\"2023-03-31T15:44:16+00:00\",\"dateModified\":\"2024-04-12T14:33:25+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/#primaryimage\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/cyb3rops_Thor_checking_a_desktop_computer_for_viruses_blue_ligh_15545217-6bf0-4dc9-9f39-f45e8a270236.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/cyb3rops_Thor_checking_a_desktop_computer_for_viruses_blue_ligh_15545217-6bf0-4dc9-9f39-f45e8a270236.png\",\"width\":1536,\"height\":1024},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\",\"name\":\"Florian Roth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"caption\":\"Florian Roth\"},\"description\":\"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.\",\"url\":\"https:\/\/www.nextron-systems.com\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise - Nextron Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/"},"author":{"name":"Florian Roth","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919"},"headline":"Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise","datePublished":"2023-03-31T15:44:16+00:00","dateModified":"2024-04-12T14:33:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/"},"wordCount":3159,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"image":{"@id":"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/cyb3rops_Thor_checking_a_desktop_computer_for_viruses_blue_ligh_15545217-6bf0-4dc9-9f39-f45e8a270236.png","articleSection":["Alert","APT","Homepage","Nextron","THOR","THOR Lite","Tutorial","YARA"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/","url":"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/","name":"Using THOR Lite to scan for indicators of Lazarus activity related to the 3CX compromise - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/#primaryimage"},"image":{"@id":"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/cyb3rops_Thor_checking_a_desktop_computer_for_viruses_blue_ligh_15545217-6bf0-4dc9-9f39-f45e8a270236.png","datePublished":"2023-03-31T15:44:16+00:00","dateModified":"2024-04-12T14:33:25+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/2023\/03\/31\/using-thor-lite-to-scan-for-indicators-of-lazarus-activity-related-to-the-3cx-compromise\/#primaryimage","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/cyb3rops_Thor_checking_a_desktop_computer_for_viruses_blue_ligh_15545217-6bf0-4dc9-9f39-f45e8a270236.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2023\/03\/cyb3rops_Thor_checking_a_desktop_computer_for_viruses_blue_ligh_15545217-6bf0-4dc9-9f39-f45e8a270236.png","width":1536,"height":1024},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919","name":"Florian Roth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","caption":"Florian Roth"},"description":"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.","url":"https:\/\/www.nextron-systems.com\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/16538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=16538"}],"version-history":[{"count":55,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/16538\/revisions"}],"predecessor-version":[{"id":16743,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/16538\/revisions\/16743"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media\/16537"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=16538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=16538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=16538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}