4.9 • 696 Ratings
🗓️ 16 December 2021
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Thursday, December 16th, 2021 edition of the Sansonet Storm Center's Stormcast. |
0:08.8 | My name is Johannes Ulrich. |
0:10.5 | And I'm recording from Jacksonville, Florida. |
0:14.3 | Looking through recent submissions to virus total, Xavier came across a pretty simple powerShell backdoor that distinguish itself by being, |
0:24.1 | well, not detected by a single and high virus tool. PowerShell back doors are, well, |
0:29.8 | daily occurrences, so you would think that Anah virus tool have a little bit of handle on them, |
0:35.6 | but if you're looking at the one that Xavier found, you can kind of see how they have a little bit of handle on them, but if you're looking at the one that Xavier found, |
0:39.3 | you can kind of see how they have a hard time with these very simple ones. |
0:43.3 | In this case, it arrives as an obfuscated string that basically just is then split and |
0:49.0 | selected characters are extracted from it, and the main payload is then actually received from a |
0:56.4 | command control server as JSON data and then executed via invoke expression. But even if |
1:03.9 | antivirus fails you here, not all is lost. Xavier is listing a couple of tricks that you can use in order to detect the network traffic |
1:14.2 | that this PowerShell backdoor generates. |
1:17.7 | First of all, it sends HTTP requests on a slightly unusual port 888888, and it sends them to a specific |
1:26.1 | IP address, not to a host name. |
1:28.5 | So the good old trick to look for any outbound connections to IP addresses that did not get returned as DNS response. |
1:37.9 | Well, that's usually suspicious and something to look at. |
1:42.7 | And then, of course, on your endpoint, having PowerShell |
1:46.2 | connect to an odd port like this should also be something that you can alert on. So Anavirus, |
1:55.0 | really sort of your first and hopefully not last layer of defense and a good combination of host-based defenses |
2:03.9 | and network defenses usually can fill the gaps |
2:07.5 | that antivirus leaves behind. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.