4.9 • 696 Ratings
🗓️ 13 December 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello, welcome to the Thursday, December 13th, 2018 edition of the San Bernard Storm Center's Stormcast. My name is Johannes Ulrich and the damn recording from Washington, D.C. |
| 0:13.0 | As I mentioned before, we always love it when readers sent us interesting Malware in. The latest case, Vince sent us a word document that looked malicious |
| 0:23.9 | had all the hallmarks of being malicious and Vince actually started analyzing it and he |
| 0:29.3 | tried to follow a procedure that DDA had outlined in a prior diary but it didn't quite work |
| 0:36.2 | so did he took a look at this particular document, |
| 0:40.3 | and well, the problem here was that the value of the variable that you have to actually search for |
| 0:46.6 | was obfuscated itself. And de-obfuscating this isn't really all that trivial. So Didier |
| 0:53.3 | shows in his latest diary a little shortcut |
| 0:57.0 | where you're really just looking for long strings in the document and that led Didi |
| 1:03.1 | then to the malware. Now the PowerShell script in this document was obfuscated itself again |
| 1:10.3 | using a fairly well by now I guess standard obfuscated itself again using fairly well by now I guess |
| 1:12.4 | standard obfuscation technique that the DA calls DOS fuscation for its use of |
| 1:19.1 | DOS commands the power shell script turned out to be a downloader it did attempt to |
| 1:24.7 | download malware from five different URLs that then turned out to be |
| 1:30.6 | an Emotet variant. An ESET published an interesting report with a collection of various |
| 1:39.2 | open SSH backdoors that they found in the wild. OpenSH back doors are a common way for an attacker to get persistence and also to do some lateral |
| 1:51.1 | movements. |
| 1:52.1 | So what happens here is that the attacker first gets root access on a system, then uses |
| 1:58.4 | the axis to install a Trojan version of the OpenSH server. |
| 2:05.3 | Typically what happens here is that credentials that are being passed to the server are being |
| 2:10.2 | logged and ex-filterated. |
| 2:11.7 | They of course also can provide static credentials that can then be used to log in even after the user has deleted |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.