4.9 • 696 Ratings
🗓️ 12 July 2021
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, July 12, 2021 edition of the Sansonet Storm Center's Stormcast. My name is Johannes Ulrich. |
0:09.5 | And today I'm recording from Jacksonville, Florida. He noticed some interesting scans against his honeypot, |
0:15.9 | and these scans while they're using HTTP and are going to port 443, the payload indicates |
0:24.4 | that they actually attempt to establish a secure socket tunneling protocol or SSTP connection. |
0:31.6 | SSTP is a VPN solution that's somewhat proprietary to Microsoft. It's essentially sort of a PPP over |
0:40.8 | HTTP connection. The nice part about this, of course, is that it can work with some proxies |
0:48.4 | and does enable a pretty straightforward and simple VPN gateway on Windows systems configured with |
0:58.3 | this protocol. It's not enabled by default as far as I can tell, but it does on the other hand |
1:05.8 | possibly open up a gateway with weak passwords and such. So not really clear what the attacker is going |
1:13.1 | after here, if they're going to try some weak passwords or if they're just enumerating systems, |
1:19.8 | there is no currently known widely used vulnerability in this protocol. And on Friday, Brad wrote up some interesting new behavior of the Hankitore malware. |
1:33.5 | In this case, the malware is downloading an dot-xll file. |
1:39.8 | Dotxll files are Excel add-ins. |
1:42.4 | They're a little bit similar to DLL files in terms that there are |
1:47.4 | binary extensions that are being downloaded and executed by Excel, probably trying to attempt |
1:54.6 | to bypass some simple filters with this little bit odd extension. Other than that, it's well your standard hand guitar malware. |
2:04.6 | In this case, what Brad observed is that he ended up with Cobalt Strike if the malware is operated |
2:12.6 | in an active directory environment. |
2:15.6 | This is something that has been showing up more and more over the last |
2:19.3 | year, where malware behaves differently if it's an active directory environment, where in particular |
2:24.8 | it downloads Cobalt Strike, suggesting that an attacker is then going to do some manual follow-up |
2:31.8 | if it is part of a larger network, Of course, often with the intent then to |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.