4.9 • 696 Ratings
🗓️ 13 March 2023
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Monday, March 13th, 2020, |
0:05.1 | 3 edition of the Sandsenet Storms, Stormcast. My name is Johannes Ulrich, |
0:11.0 | and today I'm recording from Jacksonville, Florida. |
0:15.0 | We've got a couple of, you know, the Storm Center diaries to catch up with |
0:18.6 | that were published over the weekend. |
0:26.8 | Let's start with a Ghee posted about as an rat sample. |
0:30.2 | So a simple remote access trojan. |
0:36.2 | It arrived as a bill payment invoice, I believe in Spanish, maybe Portuguese. |
0:40.0 | And while he published the indicators of compromise, like host names, IP addresses, and such that this particular Malaver connects to. |
0:48.0 | Alex Xavier came across Mirai payload generator. So this is how you basically would add a new host to the Mirai botnet. |
0:57.2 | Mirai has been going around for quite a while. |
1:00.9 | Xavier points out a diary from back in 2016 when we first discussed it. |
1:07.1 | Remember, it was sort of the first one that sort of really very aggressively scanned for Telnet and S-H servers. |
1:14.6 | Since then, the number of Mirai versions has really exploded with new exploits and new little tricks. |
1:22.6 | Well, this Mirai payload generator kind of shows you some of the flexibility that this botnet has right now. |
1:31.5 | And finally, probably the most interesting diary from this weekend is one by Xavier, |
1:37.7 | where he looks at a browser hijacking a script that basically does obfuscation, not just by obfuscating the code itself, |
1:46.7 | but also by using various different technologies. It starts out with good old visual basic |
1:52.5 | script, but then also uses a PowerShell. It uses some C-sharp code that's sort of being compiled |
1:59.9 | here as the script runs. |
2:02.9 | So all of these different technologies likely are contributing to a fairly bad recognition rate |
2:10.5 | by Anteimalver for this particular example. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.