IronWind

Description

(Proofpoint) Once sideloaded, IronWind sent an HTTP GET request to a known TA402 C2 domain. After receiving the HTTP GET request, the C2 responded with shellcode that represented the third stage of the infection chain. During Proofpoint’s analysis, the shellcode used reflective .NET loaders to conduct WMI queries. The shellcode also served as a multipurpose loader, downloading the fourth stage—a .NET executable that used SharpSploit, a .NET post-exploitation library written in C#.

Names

Name
IronWind

Category

Malware

Type

  • Backdoor

Information

Malpedia

Other Information

Uuid

177c5394-070d-4a88-b852-f8220f23d26e

Last Card Change

2024-01-17