meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Thursday, May 14th 2020

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 14 May 2020

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Dridex Update; Ramsay "Airgap" Malware; Windows 10 DoH Preview; #SANSFIRE Handler Series

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Thursday, May 14th, 2020 edition of the Sandstone Storm Center's Stormcast.

0:07.9

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:13.5

In Diaries today, we have Brad talking about the latest version of Tridex that he ran into.

0:20.9

Now, this particular sample was collected on May 12th, so earlier this week on Tuesday,

0:27.9

and well, it follows off the standard pattern as far as Tridex goes.

0:32.7

It arrives as an email that then links to a SIP archive.

0:38.3

Now, the user has to download and decompress this SIP archive,

0:43.3

which then reveals a visual basic script

0:46.3

that will actually do the malicious action,

0:49.3

which in this case will download three different DLs.

0:54.8

Well, actually first the DLL with the Tridex payload, and then over HTPS, it will download

1:01.0

those three additional DLs.

1:04.1

Sort of interesting, but I've seen this in most malware samples and also fishing samples these days.

1:12.5

If your IP address happens to be on a placlist,

1:17.3

essentially something that the attacker believes is a researcher or the like,

1:22.5

then you will be redirected to a benign page,

1:26.5

making it look like this email was just spam.

1:31.7

Now, while this is sort of your run-of-the-mill tridex, we have seen this for years,

1:37.6

ESET has what they're sort of considering a more cutting-edge piece of malware that they're

1:42.7

calling Ramsey.

1:45.4

But what's kind of amazing is that there are a lot of similarities between this malware and sort of your run-of-the-mill

1:51.1

malware that we see every day. First of all, it doesn't really look like it's using a very

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.