4.9 • 696 Ratings
🗓️ 7 January 2025
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Tuesday, January 7th, 2025 edition of the Santonet Storm Center's Stormcast. |
0:09.2 | My name is Johannes Ulrich. |
0:10.7 | I'm recording from Jacksonville, Florida. |
0:14.7 | Keeping Malaver happy, this was the title of Xavier's diary today. |
0:19.7 | Now, keeping Malver happy for a reverse analyst like Xavier |
0:24.9 | means keeping it running in an environment that doesn't give away that it's being analyzed. |
0:32.3 | And he is going over a couple of ways how Malver detects, |
0:37.2 | whether or not it's running in some |
0:39.4 | kind of debugger or analysis environment. For example, whether or not outer space layout |
0:44.8 | randomization or ASLR is enabled. That often matters how the Malver behaves. So the reason this |
0:52.4 | matters is you need to set up a correct environment to get |
0:56.5 | correct results as you are running the malware. Running the malware, of course, is often the easiest |
1:02.5 | way to get a quick impression of what the malware is up to. And Xavier will walk you through some of the tricks that he employs in order to keep |
1:14.4 | Malver happy. In vulnerabilities, we do have vulnerability in the nuclear vulnerability scanner. |
1:22.3 | Vulnerability scanners, of course, often need access to systems in order to scan systems using host-based scripts for vulnerabilities. |
1:33.0 | Well, sadly, in nuclear vulnerability in how the templates that are controlling nuclei are being parsed |
1:39.5 | can be used to execute arbitrary code, which is the feature of nuclei in some ways, but of course |
1:46.1 | you want to restrict it to only authorized users, which isn't the case here due to this |
1:52.4 | vulnerability. What should you do? Well, update, that's really it. And whenever you're dealing |
1:58.2 | with templates like this, make sure you are using templates from trusted sources. |
2:04.4 | Ultimately, you are giving these templates access. |
2:07.9 | So if you're installing a malicious template, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.