TA505 Threat Hunting: Advanced Queries for Detecting Malware and Cyber Attacks

TA505 is a financially motivated cybercriminal group known for large-scale malware distribution and sophisticated phishing campaigns. Active since 2015, they utilize advanced social engineering tactics and target various sectors, including finance and healthcare. The article discusses threat hunting techniques in Azure/XDR to detect TA505 activities. Affected: finance, retail, healthcare, critical infrastructure

Keypoints :

  • TA505 is also known as GOLD TAHOE or FIN11.
  • They have been active since at least 2015, focusing on malware distribution.
  • Notable for their large-scale email phishing campaigns.
  • Operated as a “malware-as-a-service” provider for other threat actors.
  • Known for using advanced social engineering tactics.
  • Targeted sectors include finance, retail, healthcare, and critical infrastructure.
  • The article provides advanced hunting queries for detecting TA505 activities in Azure/XDR.
  • Effective cybersecurity requires proactive monitoring and evolving detection capabilities.

MITRE Techniques :

  • Execution (T1203) – Exploitation of vulnerabilities in documents (CFBF files) with embedded payloads.
  • Execution (T1059) – Use of macro-enabled files (.xls, .xlsm, .doc, .docm) to execute malicious code.
  • Defense Evasion (T1562) – Manipulation of process integrity levels to avoid detection.
  • Credential Access (T1070) – Use of social engineering tactics to gain access to sensitive information.
  • Collection (T1119) – Gathering of data through malware and phishing techniques.

Indicator of Compromise :

  • [file name] basecamp
  • [file name] MSForms.exd
  • [file name] FM20.DLL
  • [file name] InitScope.dll
  • [file name] vspub2.dll-
  • Check the article for all found IoCs.

close with


Full Story: https://securityunfiltered.medium.com/ta505-threat-hunting-advanced-queries-for-detecting-malware-and-cyber-attacks-2d3fa630cbf9?source=rss——cybersecurity-5