4.9 • 696 Ratings
🗓️ 12 August 2021
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, August 12, 2021 edition of the Sansonet Storm Center's Stormcast. |
0:09.2 | My name is Johannes Ulrich and the I'm recording from Stockholm, Germany. |
0:14.7 | And Brad did some malware analysis again, and he looked at the latest example of TA 551 or Shad hack. |
0:24.6 | This particular Mountar group he talked about before and it's your typical malicious email. |
0:30.6 | In this case the attachment arrived as a password protected zip file. |
0:36.6 | Now once extracted you got your standard word macros |
0:42.6 | that then dropped additional matter, including the bizarre loader. |
0:48.8 | Now, what we see more and more lately, of course, is Cobalt Strike Next. |
0:55.0 | And Brad has, in the right-up, the traffic that actually Cobalt Strike generated. |
1:03.0 | That's probably the most interesting part here, because you see this in so many different |
1:09.0 | malice samples these days. |
1:11.6 | The traffic captures are again available for download, so if you would like to play with them yourself, |
1:17.6 | you may do so just look at Pratt's diary. |
1:22.6 | But well, it's not just Windows users that click on things. Apple users aren't immune either. |
1:29.4 | And Sentinel Labs looked at Adload. |
1:34.4 | MacOS Malva family, it has been around since 2019. |
1:39.4 | And Sentinel Labs looked at 150 unique samples just this year. What's sort of interesting here |
1:47.5 | and pointed out by Sentinel Labs is that Apple's ex-protect, which is supposed to protect |
1:53.4 | you from Malvern like that, apparently isn't that terribly effective. Well, X-Protect is |
2:00.1 | really very much a signature dependent and typically |
2:03.6 | easily evaded. According to the article, there are about 11 different signatures in XProtect |
2:10.6 | for different ad load versions, but the ad load keeps mutating and specifically evading these signatures that Apple has |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.