4.9 • 696 Ratings
🗓️ 10 June 2022
⏱️ 9 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Friday, June 10th, 2020 edition of the Sands and at Storm Center's Stormcast. |
0:08.0 | My name is Johannes Ulrich, and today I'm recording again from Jacksonville, Florida. |
0:14.4 | I think I mentioned yesterday how Q-Bot is taking advantage of the unpatched Folina vulnerability in Microsoft Windows. |
0:24.5 | Now, today we got a walkthrough of a sample by Brad. |
0:28.2 | As typical for Brad, he shares the sample as well as network traffic and indicators of compromise. |
0:34.9 | He extracted. |
0:36.1 | So great to sort of walk through it and see how to |
0:40.3 | analyze these type of samples. The malicious email will likely arrive as part of a hijacked threat, |
0:47.2 | a technique that we have talked about before a few times, where a bot is injecting emails |
0:53.0 | into ongoing email exchanges, it finds on infected systems. |
0:58.1 | This of course makes it less likely that a user receiving an email like this will consider it |
1:04.4 | suspicious because after all it's coming from a colleague. |
1:07.2 | They just exchanged emails with the Fol Exploid is actually used late in the |
1:13.6 | infection chain here. A user will initially receive an HTML document, then they will get a SIP |
1:20.3 | file. If they click on the link, the SIP file contains then a disk image and only once the victim |
1:27.0 | opens the disk image, the work document |
1:29.3 | that is contained in the disc image will take advantage of the fully not vulnerability |
1:35.4 | and install the actual malware. Also, for interesting, it sort of uses some Living of the Land |
1:41.6 | attacks here, and Psyc setup.exe is the binary that is being used then to pull in additional stages. |
1:51.9 | The complex execution chain, I think, is probably to evade network detection techniques. |
1:58.6 | Also, Mark of the Web, kind of to avoid some of this. |
2:02.5 | Pratt observed that the MS debug trace tool that's sort of being used to as Partifolina |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.