4.9 • 696 Ratings
🗓️ 13 April 2023
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Thursday, April 13, 2023 edition of the Sans and at Storm Center's Stormcast. |
0:08.6 | My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida. |
0:14.8 | Well, today we got another Malware diary to start out with. |
0:20.1 | Pratt wrote about iced ID or also Bokbot that he saw |
0:25.4 | this week. This particular sample comes from Tuesday and, well, given that Google is making quite a |
0:32.7 | bit of money with malicious advertisements, they're giving back to the malware community, |
0:38.4 | but also hosting their malicious password-protected SIP archives in Google Firebase. |
0:45.5 | That's what this particular malware does. |
0:49.4 | The attacker is first sending a PDF to the victim. |
0:53.7 | The PDF includes a link that will then download |
0:56.9 | the particular SIP file from Google Firebase. The PDF, of course, also provides the password |
1:03.9 | that the victim then uses to unsip this archive, which then ends up with an executable that's actually valid digitally signed. |
1:15.5 | Ultimately, the victim then ends up with the Iced ID, Delal injected into a valid process. |
1:23.1 | Now the follow-on activity that Pratt observed includes BackConnect as well as VNC. |
1:31.0 | So the attacker may very well then switch to a more manual, second third, or whatever you want to call it, stage to then infect, encrypt, or do whatever with the victim. |
1:42.6 | Brad, of course, as usual, provides P-Caps, |
1:46.1 | hashes, and all that good stuff. So great learning opportunity here to take the P-CAP and sort |
1:53.0 | of follow along as Brad did here and analyze the P-CAP in order to detect the particular |
2:00.3 | malicious activity. |
2:03.6 | And then a follow-up to patch Tuesday, we got more details from Checkpoint regarding some of the Microsoft MessageQ vulnerabilities. |
2:12.6 | There are three vulnerabilities. |
2:14.6 | Total, one is a remote code execution. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.