meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, January 16th, 2024

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 16 January 2024

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Malware Obfuscation; Ivanti Updates; NVidia Firmware Vuln; GitLab Vuln;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, January 16th, 2024 edition of the Sands and at Storms

0:08.2

unters Stormcast. My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida.

0:15.2

No podcast on Monday, sorry, I think I misspoke here on Friday due to observance of Martin Luther King Day,

0:23.3

but we did have an interesting diary over the weekend, one file, two payloads by Xavier.

0:30.7

Now, one of the interesting features of this Malver was how it actually creates the string PowerShell.

0:37.2

Of course, a lot of Malware uses PowerShells,

0:39.3

so there are a lot of signatures looking for the PowerShell string in particular. If it's encoded in

0:47.3

various ways, well, this particular Malver didn't really encode the PowerShell string. Instead, it dynamically assembled it.

0:56.1

And one interesting, kind of a little bit overly complicated, I think, thing it did is

1:01.5

it looked for services that contained a string Microsoft.

1:05.7

And then it pulled the S out of Microsoft to assemble the string PowerShell.

1:12.3

Basically, the S-in-shell came from the service name that it pulled out of the service list.

1:20.0

Interesting idea.

1:21.9

Doubted actually really necessarily to be that complicated, but, well, it worked for that malware, apparently.

1:27.3

It also

1:27.7

then later had sort of an interesting second stage download that did, depending on the offset,

1:34.7

you looked at for the particular file, contain different parts of the second and then, I guess,

1:41.3

sort of third stage of the malware. At offset zero, there was the executable payload, and then, I guess, sort of third stage of the Malver.

1:50.3

At offset zero, there was the executable payload, and then later about 280 kilobytes in,

1:53.6

there was the second stage PowerShell script.

1:57.0

This, again, is often done sort of for obfuscation.

2:01.8

Quite frankly, you have sort of at the beginning then, actually some sort of harmless file an image or something like this and then at the end appended the actual malicious payload.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.