4.9 • 696 Ratings
🗓️ 16 October 2016
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, October 17th, 2016 edition of the Sansonet Storm Center's Stormcast. My name is Johannes Ulrich, and I'm recording from Baltimore, Maryland. |
0:13.2 | Over the weekend, we got two posts related to Malware, first one from Brad about the latest news from the pseudo-darkleach campaign, |
0:23.4 | which is something that Brad has been following in his last post, which was about two weeks ago, |
0:31.2 | he observed how it's being used via the Rick Exploid kit to distribute the SIPMIC ransomware. |
0:40.2 | Apparently, they now changed out the ransomware for Kerber. |
0:44.7 | This is very common where sort of different components in these campaigns are being exchanged |
0:50.4 | depending on whatever works best that particular day or that particular week. |
0:57.0 | I guess development of the older ransomware isn't quite keeping up with antivirus, so they're now switching to server. |
1:06.6 | And then we have the DA talk about how to decode obfuscated visual basic script that you often see in malicious macros |
1:16.3 | by essentially just running the appropriate part. |
1:20.1 | And then, for example, filling it into an Excel cell so that you can just read whatever came up or use a message box in order to |
1:30.8 | display the decoded content. Now, this trick works really well. He then actually also |
1:37.7 | shows you a little video and how to do that, not just, of course, with visual basic macros |
1:43.1 | in Excel, but also in VIRT you use essentially |
1:46.5 | the same Excel spreadsheet technique in order to do that. |
1:50.5 | I think it should be understood. |
1:52.1 | You have to be careful when you do this. |
1:54.1 | It's very easy to mess up and run more of the script than you intended to. |
2:00.2 | But this is very similar to what's often done |
2:03.4 | for example in JavaScript where you just sort of put a text area around some |
2:09.6 | off-uscated JavaScript and then have it decode itself in that text area which can |
2:16.5 | work actually quite nicely. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.