A definitive guide to “color birds,” what we call fledgling activity clusters we’ve named after tracking patterns of malicious behavior.
You may have noticed some unusual names in Red Canary’s reporting; when our Intelligence team encounters a cluster of activity that does not match any known threats we are tracking, we use a naming convention inspired by Red Canary’s own name: color + bird. We choose the various colors and bird species with help from our resident birdwatchers, who make connections based on ornithological behavior similarities. We’re partial to alliteration.
In this new and handy field guide, we’ve rounded up the most interesting activity clusters we’ve named and tracked over the last few years, including some endangered species we haven’t seen in a while.
First observed: November 2024
Release date: December 2024
Last observed: December 2024
Tangerine Turkey is an activity cluster characterized by a Visual Basic Script (VBScript) worm delivering a cryptomining payload, typically via infected USB. The VBScript file name typically begins with the letter x
followed by six digits, for example x644291.vbs
. A CMD child process from wscript.exe
then executes a BAT file with a similar naming convention and creates a folder named C:\Windows \System32
(note the space after Windows
). The worm then makes a copy of the legitimate printui.exe
from C:\Windows\System32
to the newly created C:\Windows \System32
folder, as well as a malicious DLL named printui.dll
as a sideloaded DLL hijack.
The following pseudo-detection analytic identifies instances of printui.exe
relocated outside of Windows\System32
.
process_path_is_unexpected == (printui)
First observed: January 2024
Release date: March 2024
Last observed: December 2024
Amber Albatross, our fifth most prevalent threat of 2024, is an activity cluster characterized by certain potentially unwanted programs (PUP) delivering a setup file and stealer payload. A complex installation chain with obfuscation and anti-analysis techniques eventually leads to unpacking a Pyarmor-obfuscated pyInstaller
that is launched via cmd.exe
and powershell.exe
, before initiating a sequence of reconnaissance commands similar to those used by many stealers.
The following pseudo-detection analytic looks for PowerShell processes executing binaries from the temp
directory that do not have a file extension.
process == (‘powershell.exe’)
&&
command_line_includes (‘Start-Process’)
&&
filemod_path_includes (‘AppData\Local\Temp’)
&&
filemod_extension == (“”)
First observed: September 2022
Release date: July 2024
Last observed: August 2024
Saffron Starling is an activity cluster that downloads and delivers malicious payloads following a phishing attempt. Specifically, the loader is delivered via ZIP archives containing JScript or VBScript. When executed, the scripts create a renamed copy of cURL
and download the subsequent payload, which include Danabot, DarkGate, or Matanbuchus malware. In some cases, a PDF file is downloaded and presented to the user in order to distract from payload deployment.
The following pseudo-detection analytic identifies renamed instances of cURL
. See our blog on profiling executable metadata for additional guidance on how to implement the following detector idea.
process_is_renamed == (‘curl’)
First observed: June 2023
Release date: August 2023
Last observed: December 2024
Scarlet Goldfinch, our third most prevalent threat of 2024, is an activity cluster that lures unsuspecting victims to download a malicious browser update, similar to SocGholish and other fake update threats. To get access to systems, Scarlet Goldfinch redirects users from compromised sites that contain injected JScript code to a site that prompts victims to download a fake update to their internet browser. The download contains the first-stage JScript that is executed via wscript.exe
. Upon execution, the JScript downloads an additional payload, which has consistently been NetSupport Manager.
The following pseudo-detection analytic looks for execution of NetSupport Manager from a non-standard directory (i.e. somewhere other than the Program Files directory).
process_path_is_unexpected == (‘client32.exe’)
First observed: March 2023
Release date: April 2023
Last observed: December 2024
Lilac Lyrebird is an activity cluster associated with search engine optimization (SEO) poisoning and malvertising. It leads to a technical support scam that tricks users into giving the operator access to their machine via LogMeIn. Once the adversary gains access, they use PowerShell to download a malicious batch file that is executed via the creation of a scheduled task.
The following pseudo-detection analytic looks for instances of PowerShell using iex(New-Object Net.WebClient).DownloadString
to download files hosted remotely. Note that you will need to tune this for your environment.
process == (‘powershell.exe’)
&&
command_line_includes == (downloadstring)
&&
command_line_does_not_include == (*)
First observed: March 2023
Release date: April 2023
Last observed: December 2024
Charcoal Stork is an activity cluster involving a suspected pay-per-install content provider that relies on malvertising to deliver installers. These installers masquerade as anything from cracked games to wallpaper, and their goal is to install malicious payloads. Early Charcoal Stork campaigns delivered ChromeLoader and SmashJacker, where sightings in 2023 delivered more concerning malware such as VileRAT, a Python remote access trojan (RAT) that is reportedly uniquely used by a cyber mercenary group called DeathStalker. Files associated with Charcoal Stork have a default filename of install.exe
or Your File Is Ready to Download
. We primarily distinguish Charcoal Stork activity from follow-on activity through installer file names and hashes.
Look for tactics, techniques, and procedures consistent with known payloads of Charcoal Stork, including ChromeLoader and SmashJacker.
Other filenames we have seen in the wild include:
1680x1050 european robin garden inhabitant_ rob___.msi
22621.1778.230511-2102.ni_release_svc_prod3_windowssdk.iso
z7550_97650_syr-2023.32-sspsy-20230802.2023_0821.6.iso
download.iso
download (1).iso
browse fmovies.iso
file_ elden.ring.deluxe.edition.v1.03.3.zip.tor....iso
sing 2_ ¡ven y canta de nuevo! (2021).iso
First observed: September 2021
Release date: February 2022
Last observed: December 2024
Raspberry Robin is an activity cluster involving a worm, possibly installed via USB drive, that may be related to ransomware. This activity cluster uses msiexec.exe
to call out to infrastructure, typically compromised QNAP devices, using HTTP requests that contain user and device names of the victim. This has led to the downloading and execution of malicious DLL files.
The following pseudo-detection analytic looks for msiexec.exe
making outbound network connections to download and install packages in the command-line interface allows for the opportunity to examine the activity and determine if it’s malicious or not.
process == (‘msiexec.exe’)
&&
command_line_includes (‘http:’ | | ‘https:’)
&&
command_line_includes (‘/q’ | | ‘-q’)
First observed: April 2020
Release date: July 2021
Last observed: August 2024
Mango Parakeet is an activity cluster characterized by subtle masquerading techniques, such as naming malicious binaries svcnost.exe
to mimic svchost.exe
, renaming wscript.exe
to execute malicious JS files, using rudimentary homograph spoofing such as replacing a lower-case l
with a capital I
, and extending spacing between the malicious executable’s name and extension. Mango Parakeet is often observed spreading malicious worms via USB flash drives. During execution, Mango Parakeet uses cmd.exe
to launch batch scripts to create malicious executables, JavaScript, and DLL files on a target system. It then launches the malicious JavaScript file using a renamed instance of wscript.exe
.
The following pseudo-detection analytic looks for Windows Script Host (wscript.exe
) running from an unexpected directory.
process_path_is_unexpected == (‘wscript.exe’)
First observed: October 2020
Release date: December 2020
Last observed: November 2024
Yellow Cockatoo is an activity cluster that is characterized by search engine redirects eventually leading to the in-memory execution of a .NET remote access trojan (RAT). Yellow Cockatoo’s malware has the capability to drop additional payloads and use encoded PowerShell to steal browser information. Interestingly, this bird is known to “fly south for the winter,” in that it takes breaks after researchers publish information about its operations, resuming activity months later after retooling.
The following pseudo-detection analytic looks for persistence mechanisms in multiple threats related to startup folder persistence.
process == (‘powershell.exe’)
&&
filemod_path_includes (‘start menu\programs\startup’)
&&
filemod_extension == ‘.lnk’
First observed: September 2020
Release date: January 2021
Last observed: December 2024
Silver Toucan is an activity cluster that uses signed macOS malware to deploy payloads such as AdLoad, often for ad fraud and other monetization activities. Silver Toucan discloses its own terms of service stating that victim hosts may be used for proxy activities. This cluster requires user interaction with an Apple Disk Image File (DMG) or macOS Installer File (PKG). Once executed, Silver Toucan establishes persistence using macOS LaunchAgents. The cluster uses the cURL
utility to conduct command and control (C2) operations, log installation and update progress, and to receive bash
commands to download and execute additional files. In some cases, Silver Toucan delivers AdLoad malware as a payload.
The following pseudo-detection analytic looks for a shell process executing a file downloaded using the curl
utility.
process == (any osx shell)
&&
command_line_includes (‘curl ‘ && ‘;eval’)
First observed: November 2021
Release date: February 2022
Last observed: March 2023
Coral Crane is an activity cluster that uses ISO images containing malicious VBScript code followed by obfuscated PowerShell commands to filelessly download and execute payloads such as AsyncRAT. The activity cluster uses simple obfuscation through string replacement in PowerShell commands to deobfuscate code prior to execution.
The following pseudo-detection analytic looks for wscript.exe
spawning PowerShell that uses Invoke-Expression
or one of its aliases.
process == (‘powershell.exe’)
&&
any_parent_process == (‘wscript.exe’)
&&
process_command_line_includes == (‘iex’ | | ‘invoke’ | | ‘invoke-expression’)
First observed: January 2021
Release date: February 2021
Last observed: August 2023
Silver Sparrow is an activity cluster with infrastructure designed to deliver malware to macOS systems. It leverages AWS S3 buckets to stage macOS PKG files with names like update.pkg
or updater.pkg
. During execution, the malware executes JavaScript to orchestrate the creation of files and scripts for persistent execution, attempting to download updated payloads from additional S3 buckets every hour. There are specialized variants of Silver Sparrow for the x86_64 and the Apple M1 ARM64 architectures, implying that the malware was intended specifically for newer macOS systems.
The following pseudo-detection analytic looks for use of the plistbuddy
command, a built-in tool in macOS that allows administrators to manipulate property lists, or plist, files used to configure various parts of the macOS operating system.
process == (‘plistbuddy’)
&&
command_line_includes (‘RunAtLoad’)
First observed: February 2020
Release date: August 2020
Last observed: June 2023
Blue Mockingbird is an activity cluster that deploys a DLL version of XMRig on Windows systems. Tracked publicly since August 2020, the threat achieves initial access by exploiting public-facing applications, eventually establishing persistence by using the COR_PROFILER
environment variable to hijack execution flow, task scheduling, or service installation. To execute, Blue Mockingbird either registers the DLL with regsvr32.exe
or executes using rundll32.exe
. Ultimately, the cluster tries to use system resources to mine cryptocurrency, specifically referring to Monero wallet addresses.
The following pseudo-detection analytic looks for wmic.exe
manipulating the COR_PROFILER
environment variable to establish persistence and bypass UAC.
process == (‘wmic.exe’)
&&
command_line_includes (‘COR_PROFILER’)
Get curated insights on managed detection and response (MDR) services, threat intelligence, and security operations—delivered straight to your inbox every month.