Concrete signature match: Hack Tool - Tool used to exploit vulnerabilities for 64-bit Windows platform, family Chisel
This threat is a detection for Chisel, a network tunneling tool frequently used by attackers to establish command and control (C2) and pivot into internal networks. The detection, based on machine learning, indicates the tool is being used maliciously in conjunction with other Windows utilities for execution and persistence.
Relevant strings associated with this threat: - chisel-v (PEHSTR_EXT) - chiselclientclosed (PEHSTR_EXT) - chisel-chunkedcommand (PEHSTR_EXT) - sendchisel (PEHSTR_EXT) - CHISEL_KEY (PEHSTR_EXT) - chisel.pid (PEHSTR_EXT) - chiselclient (PEHSTR_EXT) - CHISEL_CONNECT (PEHSTR_EXT) - jpillora/chisel (PEHSTR_EXT) - client.func1 (PEHSTR_EXT) - .GenerateKey (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
19188a4c5110709fe0277421eab563bf4d738cdd3766a440e76ff00cd653dc88Immediately isolate the affected host from the network. Investigate process, network, and command-line logs to identify the C2 server, persistence mechanisms, and any lateral movement. Terminate the malicious process, remove the tool and its persistence, and rotate all credentials on the compromised system.