Skip Navigation
Get a Demo
 

Field Guide to Color Bird Threats

A definitive guide to “color birds,” what we call fledgling activity clusters we’ve named after tracking patterns of malicious behavior.

Field Guide to Color Bird Threats

A definitive guide to “color birds,” what we call fledgling activity clusters we’ve named after tracking patterns of malicious behavior.

You may have noticed some unusual names in Red Canary’s reporting; when our Intelligence team encounters a cluster of activity that does not match any known threats we are tracking, we use a naming convention inspired by Red Canary’s own name: color + bird. We choose the various colors and bird species with help from our resident birdwatchers, who make connections based on ornithological behavior similarities. We’re partial to alliteration.

In this new and handy field guide, we’ve rounded up the most interesting activity clusters we’ve named and tracked over the last few years, including some endangered species we haven’t seen in a while.

Key

  • First observed: Date we started tracking the activity cluster
  • Release date: Date we released the threat profile to customers
  • Last observed: Date of the last time the threat was seen (as of December 31, 2024)

Tangerine Turkey

First observed: November 2024

Release date: December 2024

Last observed: December 2024


Field notes

Tangerine Turkey is an activity cluster characterized by a Visual Basic Script (VBScript) worm delivering a cryptomining payload, typically via infected USB. The VBScript file name typically begins with the letter x followed by six digits, for example x644291.vbs. A CMD child process from wscript.exe then executes a BAT file with a similar naming convention and creates a folder named C:\Windows \System32 (note the space after Windows). The worm then makes a copy of the legitimate printui.exe from C:\Windows\System32 to the newly created C:\Windows \System32 folder, as well as a malicious DLL named printui.dll as a sideloaded DLL hijack.

Sightings

Detection for birders

The following pseudo-detection analytic identifies instances of printui.exe relocated outside of Windows\System32.

process_path_is_unexpected == (printui)

Amber Albatross

First observed: January 2024

Release date: March 2024

Last observed: December 2024

Field notes

Amber Albatross, our fifth most prevalent threat of 2024, is an activity cluster characterized by certain potentially unwanted programs (PUP) delivering a setup file and stealer payload. A complex installation chain with obfuscation and anti-analysis techniques eventually leads to unpacking a Pyarmor-obfuscated pyInstaller that is launched via cmd.exe and powershell.exe, before initiating a sequence of reconnaissance commands similar to those used by many stealers.

Sightings

Detection for birders

The following pseudo-detection analytic looks for PowerShell processes executing binaries from the temp directory that do not have a file extension.

process == (‘powershell.exe’)
&&
command_line_includes (‘Start-Process’)
&&
filemod_path_includes (‘AppData\Local\Temp’)
&&
filemod_extension == (“”)

Saffron Starling

First observed: September 2022

Release date: July 2024

Last observed: August 2024


Field notes

Saffron Starling is an activity cluster that downloads and delivers malicious payloads following a phishing attempt. Specifically, the loader is delivered via ZIP archives containing JScript or VBScript. When executed, the scripts create a renamed copy of cURL and download the subsequent payload, which include Danabot, DarkGate, or Matanbuchus malware. In some cases, a PDF file is downloaded and presented to the user in order to distract from payload deployment.

Sightings

Detection for birders

The following pseudo-detection analytic identifies renamed instances of cURL. See our blog on profiling executable metadata for additional guidance on how to implement the following detector idea.

process_is_renamed == (‘curl’)

Scarlet Goldfinch

First observed: June 2023

Release date: August 2023

Last observed: December 2024


Field notes

Scarlet Goldfinch, our third most prevalent threat of 2024, is an activity cluster that lures unsuspecting victims to download a malicious browser update, similar to SocGholish and other fake update threats. To get access to systems, Scarlet Goldfinch redirects users from compromised sites that contain injected JScript code to a site that prompts victims to download a fake update to their internet browser. The download contains the first-stage JScript that is executed via wscript.exe. Upon execution, the JScript downloads an additional payload, which has consistently been NetSupport Manager.

Sightings

Other names

  • HANEYMANEY
  • SmartApeSG
  • ZPHP

Detection for birders

The following pseudo-detection analytic looks for execution of NetSupport Manager from a non-standard directory (i.e. somewhere other than the Program Files directory).

process_path_is_unexpected == (‘client32.exe’)

Lilac Lyrebird

First observed: March 2023

Release date: April 2023

Last observed: December 2024

Field notes

Lilac Lyrebird is an activity cluster associated with search engine optimization (SEO) poisoning and malvertising. It leads to a technical support scam that tricks users into giving the operator access to their machine via LogMeIn. Once the adversary gains access, they use PowerShell to download a malicious batch file that is executed via the creation of a scheduled task.

Sightings

Detection for birders

The following pseudo-detection analytic looks for instances of PowerShell using iex(New-Object Net.WebClient).DownloadString to download files hosted remotely. Note that you will need to tune this for your environment.

process == (‘powershell.exe’)
&&
command_line_includes == (downloadstring)
&&
command_line_does_not_include == (*) 

Charcoal Stork

First observed: March 2023

Release date: April 2023

Last observed: December 2024

Field notes

Charcoal Stork is an activity cluster involving a suspected pay-per-install content provider that relies on malvertising to deliver installers. These installers masquerade as anything from cracked games to wallpaper, and their goal is to install malicious payloads. Early Charcoal Stork campaigns delivered ChromeLoader and SmashJacker, where sightings in 2023 delivered more concerning malware such as VileRAT, a Python remote access trojan (RAT) that is reportedly uniquely used by a cyber mercenary group called DeathStalker. Files associated with Charcoal Stork have a default filename of install.exe or Your File Is Ready to Download. We primarily distinguish Charcoal Stork activity from follow-on activity through installer file names and hashes.

Sightings

Detection for birders

Look for tactics, techniques, and procedures consistent with known payloads of Charcoal Stork, including ChromeLoader and SmashJacker.

Other filenames we have seen in the wild include:

  • 1680x1050 european robin garden inhabitant_ rob___.msi
  • 22621.1778.230511-2102.ni_release_svc_prod3_windowssdk.iso
  • z7550_97650_syr-2023.32-sspsy-20230802.2023_0821.6.iso
  • download.iso
  • download (1).iso
  • browse fmovies.iso
  • file_ elden.ring.deluxe.edition.v1.03.3.zip.tor....iso
  • sing 2_ ¡ven y canta de nuevo! (2021).iso

Raspberry Robin

First observed: September 2021

Release date: February 2022

Last observed: December 2024

Field notes

Raspberry Robin is an activity cluster involving a worm, possibly installed via USB drive, that may be related to ransomware. This activity cluster uses msiexec.exe to call out to infrastructure, typically compromised QNAP devices, using HTTP requests that contain user and device names of the victim. This has led to the downloading and execution of malicious DLL files.

Sightings

Other names

  • QNAP Worm

Detection for birders

The following pseudo-detection analytic looks for msiexec.exe making outbound network connections to download and install packages in the command-line interface allows for the opportunity to examine the activity and determine if it’s malicious or not.

process == (‘msiexec.exe’)
&&
command_line_includes (‘http:’ | | ‘https:’)
&&
command_line_includes (‘/q’ | | ‘-q’)

Mango Parakeet

First observed: April 2020

Release date: July 2021

Last observed: August 2024

Field notes

Mango Parakeet is an activity cluster characterized by subtle masquerading techniques, such as naming malicious binaries svcnost.exe to mimic svchost.exe, renaming wscript.exe to execute malicious JS files, using rudimentary homograph spoofing such as replacing a lower-case l with a capital I, and extending spacing between the malicious executable’s name and extension. Mango Parakeet is often observed spreading malicious worms via USB flash drives. During execution, Mango Parakeet uses cmd.exe to launch batch scripts to create malicious executables, JavaScript, and DLL files on a target system. It then launches the malicious JavaScript file using a renamed instance of wscript.exe.

Detection for birders

The following pseudo-detection analytic looks for Windows Script Host (wscript.exe) running from an unexpected directory.

process_path_is_unexpected == (‘wscript.exe’)

Yellow Cockatoo

First observed: October 2020

Release date: December 2020

Last observed: November 2024

Field notes

Yellow Cockatoo is an activity cluster that is characterized by search engine redirects eventually leading to the in-memory execution of a .NET remote access trojan (RAT). Yellow Cockatoo’s malware has the capability to drop additional payloads and use encoded PowerShell to steal browser information. Interestingly, this bird is known to “fly south for the winter,” in that it takes breaks after researchers publish information about its operations, resuming activity months later after retooling.

Sightings

Other names

  • Jupyter Infostealer
  • Polazert
  • Solarmarker

Detection for birders

The following pseudo-detection analytic looks for persistence mechanisms in multiple threats related to startup folder persistence.

process == (‘powershell.exe’)
&&
filemod_path_includes (‘start menu\programs\startup’)
&&
filemod_extension == ‘.lnk’

Silver Toucan

First observed: September 2020

Release date: January 2021

Last observed: December 2024

Field notes

Silver Toucan is an activity cluster that uses signed macOS malware to deploy payloads such as AdLoad, often for ad fraud and other monetization activities. Silver Toucan discloses its own terms of service stating that victim hosts may be used for proxy activities. This cluster requires user interaction with an Apple Disk Image File (DMG) or macOS Installer File (PKG). Once executed, Silver Toucan establishes persistence using macOS LaunchAgents. The cluster uses the cURL utility to conduct command and control (C2) operations, log installation and update progress, and to receive bash commands to download and execute additional files. In some cases, Silver Toucan delivers AdLoad malware as a payload.

Sightings

Other names

  • UpdateAgent

Detection for birders

The following pseudo-detection analytic looks for a shell process executing a file downloaded using the curl utility.

process == (any osx shell)
&&
command_line_includes (‘curl ‘ && ‘;eval’)

Endangered species

Coral Crane

First observed: November 2021

Release date: February 2022

Last observed: March 2023

Field notes

Coral Crane is an activity cluster that uses ISO images containing malicious VBScript code followed by obfuscated PowerShell commands to filelessly download and execute payloads such as AsyncRAT. The activity cluster uses simple obfuscation through string replacement in PowerShell commands to deobfuscate code prior to execution.

Sightings

Detection for birders

The following pseudo-detection analytic looks for wscript.exe spawning PowerShell that uses Invoke-Expression or one of its aliases.

process == (‘powershell.exe’)
&&
any_parent_process == (‘wscript.exe’)
&&
process_command_line_includes == (‘iex’ | | ‘invoke’ | | ‘invoke-expression’)

Silver Sparrow

First observed: January 2021

Release date: February 2021

Last observed: August 2023

Field notes

Silver Sparrow is an activity cluster with infrastructure designed to deliver malware to macOS systems. It leverages AWS S3 buckets to stage macOS PKG files with names like update.pkg or updater.pkg. During execution, the malware executes JavaScript to orchestrate the creation of files and scripts for persistent execution, attempting to download updated payloads from additional S3 buckets every hour. There are specialized variants of Silver Sparrow for the x86_64 and the Apple M1 ARM64 architectures, implying that the malware was intended specifically for newer macOS systems.

Sightings

Detection for birders

The following pseudo-detection analytic looks for use of the plistbuddy command, a built-in tool in macOS that allows administrators to manipulate property lists, or plist, files used to configure various parts of the macOS operating system.

process == (‘plistbuddy’)
&&
command_line_includes (‘RunAtLoad’)

Blue Mockingbird

First observed:  February 2020

Release date: August 2020

Last observed: June 2023

Field notes

Blue Mockingbird is an activity cluster that deploys a DLL version of XMRig on Windows systems. Tracked publicly since August 2020, the threat achieves initial access by exploiting public-facing applications, eventually establishing persistence by using the COR_PROFILER environment variable to hijack execution flow, task scheduling, or service installation. To execute, Blue Mockingbird either registers the DLL with regsvr32.exe or executes using rundll32.exe. Ultimately, the cluster tries to use system resources to mine cryptocurrency, specifically referring to Monero wallet addresses.

Sightings

Detection for birders

The following pseudo-detection analytic looks for wmic.exe manipulating the COR_PROFILER environment variable to establish persistence and bypass UAC.

process == (‘wmic.exe’)
&&
command_line_includes (‘COR_PROFILER’)

Security gaps? We got you.

Get curated insights on managed detection and response (MDR) services, threat intelligence, and security operations—delivered straight to your inbox every month.

Sign up for our newsletter
 
 
Back to Top