4.9 • 696 Ratings
🗓️ 4 December 2018
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello, welcome to the Tuesday, December 4th, 2018 edition of the San Bernard Storm Center's Stormcast. |
| 0:07.0 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
| 0:12.4 | Now, we always appreciate if readers sent us malicious documents. |
| 0:17.9 | The latest that DDA today looked at was sent in by our reader Mike and it actually |
| 0:24.3 | included a pretty neat sort of technique how the malicious code was hidden in this document. |
| 0:30.8 | Now regardless of this, it was kind of obvious that the document was malicious, it had macros in |
| 0:36.9 | it, it used the auto-open method, so code |
| 0:40.1 | would start as you open the document, but the actual malicious code was not obvious and wasn't part |
| 0:47.8 | of the visual basic script that was included in this document. Instead, the script actually looked at the text part of the document |
| 0:56.7 | and that's where the malicious code was hiding. It then extracted the code out of the document |
| 1:03.4 | and executed it. Now, D.D.E explains as part of his diary how to use his favorite tool, |
| 1:10.3 | Olli Dump, in order to analyze documents |
| 1:12.8 | like this, and then again extract the malicious code for analysis. |
| 1:19.9 | The USR today released some extensive details regarding the Samsung ransomware. |
| 1:27.2 | Now, Samsung isn't new, but given this |
| 1:30.3 | high publicity release, it's probably something that you may see coming up this week in your office. |
| 1:38.1 | So I want to talk a little bit about Sam Sam. Sam came out, I think about a year or so ago, |
| 1:44.0 | is when I sort of first noticed it, |
| 1:46.9 | and it's ransomware, but it's different from most ransomware. |
| 1:50.8 | Normal ransomware arrives typically with a client-side exploit, so that's your typical malicious |
| 1:56.9 | document and such like the one that I talked about in the beginning of this podcast, |
| 2:02.8 | while Samsung is really more targeted. It targets specific organizations. It usually takes |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.