Query Details
// High Precision KQL to detect MuddyWater BugSleep Backdoor // https://www.linkedin.com/posts/activity-7219263422280945664-JfyY/ let DeviceAccessIOCDomain = DeviceFileEvents | where TimeGenerated > (90d) | where ActionType == "FileCreated" | where FileOriginUrl contains "egnyte.com" and FileName contains "zip" | distinct DeviceName; let DevicewithScheduledTask = DeviceEvents | where ActionType == "ScheduledTaskCreated" | where DeviceName has_any(DeviceAccessIOCDomain) | distinct DeviceName; DeviceNetworkEvents | where RemoteIP == "146.19.143.14" or RemoteIP == "91.235.234.202" or RemoteIP == "85.239.61.97" | where DeviceName has_any(DevicewithScheduledTask) // CheckPoint: New Bugsleep backdoor deployed in recent MuddyWater Campaigns // Link: https://lnkd.in/grK6knuU
This KQL (Kusto Query Language) query is designed to detect the presence of the MuddyWater BugSleep backdoor on devices within a network. Here's a simplified breakdown of what the query does:
Identify Devices with Suspicious File Creation:
Identify Devices with Scheduled Tasks:
Identify Network Events from Specific IPs:
In summary, the query identifies devices that have downloaded suspicious files, created scheduled tasks, and communicated with known malicious IP addresses, which could indicate the presence of the BugSleep backdoor associated with the MuddyWater campaign.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators