Project-Lost
Splunk Universal Forwarder
References
The Splunk Universal Forwarder (UF) is a lightweight agent used to forward logs to Splunk indexers and to receive configuration and app updates from a deployment server. When attackers compromise the deployment server, they can push malicious Splunk apps to all connected forwarders.
Malicious Splunk App Deployment
Description
A Splunk app is simply a directory structure packaged as a tar/ZIP file. Attackers can include scripts (PowerShell, Bash, Python) that run on app install or input execution, using Splunk as a stealth mass-deployment mechanism.
Simulation
Example malicious app structure:
TA_malicious/
bin/payload.ps1
default/inputs.conf
Example inputs.conf to launch payload:
[script://./bin/payload.ps1]
disabled = 0
interval = 3600
sourcetype = attacker:payload
MITRE ATT&CK
T1059 – Command and Scripting Interpreter
T1105 – Ingress Tool Transfer
Detections
DeviceProcessEvents
| where FileName in~ ("splunkd.exe","splunkd")
| where ProcessCommandLine has ".ps1" or ProcessCommandLine has ".sh"
| project Timestamp, DeviceName, InitiatingProcessAccountName, ProcessCommandLine