Skip to content

New Query: LeakNet Campaign: Deno Runtime & Klist Suspicious Execution Detection#30

Merged
Polaceka merged 1 commit intomainfrom
submission/4980c074-2739-4440-98b5-f23d92eab026
Mar 23, 2026
Merged

New Query: LeakNet Campaign: Deno Runtime & Klist Suspicious Execution Detection#30
Polaceka merged 1 commit intomainfrom
submission/4980c074-2739-4440-98b5-f23d92eab026

Conversation

@byteray-cql-hub-bot
Copy link
Contributor

New Query Submission

Name: LeakNet Campaign: Deno Runtime & Klist Suspicious Execution Detection
Author: cap10
Submission ID: 4980c074-2739-4440-98b5-f23d92eab026

Description

Detects indicators of the LeakNet campaign (analyzed by ReliaQuest, March 2026), which uses ClickFix a social engineering tactic where compromised websites display fake error dialogs that coerce users into manually pasting and executing a malicious PowerShell/CMD command. This delivers a portable Deno (JavaScript runtime) binary to user-writable directories that runs malicious payloads entirely in memory, avoiding disk-based detection. The query targets the post-delivery kill chain: Deno execution from AppData/Temp/ProgramData paths, klist.exe usage from interactive shells indicating Kerberos ticket harvesting, Deno spawning reconnaissance and living-off-the-land binaries, and dangerous Deno runtime flags or remote code fetch patterns. A noise reduction filter excludes Deno running from standard developer or Program Files paths.


This PR was automatically created by the CQL Hub submission pipeline.

@Polaceka Polaceka merged commit a39b50a into main Mar 23, 2026
2 checks passed
@Polaceka Polaceka deleted the submission/4980c074-2739-4440-98b5-f23d92eab026 branch March 23, 2026 19:33
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant