meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, January 9th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 9 January 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Reversing AutoIT; VSCode Extensions; Malicious Pypi Cloudflare Tunnel;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Monday, January 9th, 2020,

0:04.6

edition of the Sands and its Storm Center's Stormcast.

0:08.7

My name is Johannes Ulrich,

0:10.2

and the time recording from Jacksonville, Florida.

0:14.4

Last week, we had a diary by Brad where he looked at some malware

0:19.5

that took advantage of auto IT and Brad as usual

0:24.5

sort of looked at the entire infection chain from a network perspective basically what will

0:29.6

you see network traffic and then how to analyze it using tools like a wire shark on a

0:36.5

Friday we had sort of a follow-up here from Xavier.

0:40.5

Xavier looked at essentially the same malware,

0:43.4

but now more from a reverse engineering perspective.

0:46.6

So how are you actually figuring out what a particular auto IT malware does

0:52.3

by reverse analyzing it, whereas actually running it and seeing what it does

0:57.7

on the network. Pretty interesting here, of course. One advantage of auto IT is that it is a

1:04.4

scripting language, so it's text-based. When you download an auto- executable, you basically get the script interpreter and then the script

1:15.3

as an argument.

1:17.7

This particular example that Xavier looks at, it takes then advantage of a PowerShell, so runs

1:25.8

some code in PowerShell.

1:28.1

It also uses cert util to decode some base 64 encoded segment of the script.

1:36.8

The script in the beginning has, well, what looks like a certificate, but it's not a real certificate.

1:43.3

It's just base 64 encoded data that's then decoded using

1:49.1

cert util. So a standard living off the land attack for Windows malware. Need to really compare

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.