meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Wednesday, April 5th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 5 April 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. efile.com Malware; Veritas Backup Exploited; Sophos Web Applicance; Zimbra Attacks

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Wednesday, April 5th, 2020, 3 edition of the Sansonet Storms, Stormcast.

0:08.0

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:13.3

Let's start with a quick follow-up to the e-file.com situation.

0:18.7

The site has been fixed as of Tuesday morning.

0:24.0

It still has no public notice or so warning users that they may have been redirected to Malver

0:31.4

in the past.

0:33.1

I took the time today to take a closer look at one of the two malware samples that were delivered.

0:40.3

Chrome users got Update.exe, and Firefox users got installer.exe.

0:46.7

I took a look at Update.exe.

0:49.6

It's actually Python code.

0:51.8

It uses a pie installer common framework in order to turn Python code into

0:56.5

standalone executables, which makes reverse analysis relatively easy, pretty bulky piece of malware.

1:05.9

It initially actually downloads the entire PHP distribution and then has a brief PHP script

1:14.2

that actually implements a back door on a command control channel that's pretty straightforward.

1:20.1

It'll just pull a particular URL every 10 minutes, I believe it is, and then whenever there's

1:26.8

a command coming back, it will execute that command.

1:29.8

It can also download files, and that's pretty much all it does.

1:33.9

But, of course, being able to execute commands, being able to download and run code,

1:38.6

well, that's where the all that hacker needs to do to fully compromise a system.

1:43.5

One little interesting quirk here, if you run the

1:47.0

update script as a normal user, it'll actually complain and then ask you to run it as

1:53.5

administrator in order to be better able to make itself persistent by adding itself as a

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.