meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, August 11th 2017

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 11 August 2017

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Maldoc Analysis With ViperMonkey; More WoSign Trouble; SMS Touch Bugs; Mac Adware

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Friday, August 11th, 2017 edition of the Sandtonet Stormsenders Stormcast.

0:06.9

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:12.1

We've got a great new diary today by DDA. DDA is talking about how to analyze one of the more complex

0:20.2

MOTT-MELDoc samples that we received lately, and thanks

0:25.5

also, of course, to our readers that keep us supplied with interesting malware. In this particular

0:31.6

case, the first hurdle was that there was in the document zipIP file, but it was encrypted.

0:39.2

So standard techniques to extract the content of that SIP file didn't really work.

0:45.1

So DDA shows how to use SIPDump in conjunction with OliDump in order to extract this malicious

0:51.6

file from the particular document. And then the next hurdle was from the particular document.

0:55.4

And then the next hurdle was that the visual basic script was heavily obfuscated.

1:01.6

And the DDA did try to use Viper Monkey, but it didn't work out of the box.

1:06.6

He had to use the special alternate parameter in order to make it work.

1:12.2

Viper Monkey is a pretty interesting tool.

1:14.8

There's a lot of malicious visual basic scripts out there.

1:18.9

Of course, they're all obfuscated and make it difficult to analyze them.

1:23.4

So what you really need to do is you need to essentially run the visual basic script.

1:27.2

That's usually the easiest way to de-obuscate them.

1:30.3

But if you don't want to run it in the actual VIRT Visual Basic,

1:34.3

what you can do is you can use Viper Monkey, which emulates the Visual Basic parser.

1:40.3

As any emulation, it's not perfect.

1:42.3

And this particular case, the A4 alternative parameter made it work well enough in order

1:48.9

to decode this particular macro.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.