Community Feature - @Arkbird_SOLG
Curated Intelligence's very own Malware Slayer™ - Arkbird_SOLG - recently published new YARA rules to help detect a new Linux re-implementation of Cobalt Strike, dubbed Vermilion Strike. Arkbird_SOLG has shared three YARA rules to detect this threat's components: the Vermilion Beacon, the ELF file, and Vermilion Stager.
https://github.com/StrangerealIntel/DailyIOC/tree/master/2021-09-15/Vermilion_Strike
Vermilion Strike is a fully undetected ELF variant of Cobalt Strike's Beacon. The malware was discovered by Intezer and was first uploaded to VirusTotal from a user in Malaysia. Intezer worked with McAfee's telemetry and uncovered that this Linux threat has been active in the wild since August targeting telecom companies, government agencies, IT companies, financial institutions and advisory companies around the world.
Curated Intel Community Features are sourced using our Member Content channel on Discord. If you have recently produced a noteworthy piece of writing, a project, a podcast, an infographic or other CTI content let us know!