4.9 • 696 Ratings
🗓️ 1 August 2018
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, August 1st, 2018 edition of the Sands and Storm Center's Stormcast. |
0:07.8 | My name is Johannes Ulrich, and the I'm recording from Jacksonville, Florida. |
0:14.1 | Attackers are always looking for ways to use existing system tools to fly under the radar. One tool that has gotten a lot of |
0:24.3 | attention on Windows is cert util. Search Util can be used to base 64 encode content. This feature is |
0:34.1 | actually part of search Util's ability to convert different certificate formats. |
0:40.2 | For example, the popular binary DER format, it can be converted to the base 64 based PM format just |
0:49.8 | by running the file through cert util. |
0:52.9 | But when cert util performs this conversion, it actually doesn't check if the file that you |
1:00.1 | provide is a certificate. |
1:02.6 | It just takes the file, base 64 encodes it, and then adds the usual start certificate and |
1:08.7 | certificate lines to the file. |
1:12.1 | So attackers have figured it out and are using certutel now to decode various files. |
1:19.3 | Now, a normal certificate file is X509 encoded and that means that the first byte is always |
1:27.4 | 48 or 30 in hexadecimal or if |
1:31.8 | you base 64 encode this it's the uppercase letter M. |
1:38.0 | So our handler DDA wrote a Yara signature as part of his day job looking for any files that claim to be a |
1:47.4 | certificate based on the start certificate line but don't start with a letter M in the base 64 |
1:54.6 | encoded part he ran this against virus total and well no surprise here really he found a large treasure |
2:03.2 | throw of malware of course interesting here is not just that he found malware but also this |
2:09.9 | malware often wasn't recognized by any of the antivirus engines and of course instead of just |
2:16.9 | looking for certificates that aren't certificates, he was also |
2:20.9 | able to look, for example, for certificates that include Base 64 encoded executables or |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.