4.9 • 696 Ratings
🗓️ 1 March 2023
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Wednesday, March 1st, 2020, |
0:04.6 | edition of the Sand and Stormsterners Stormcast. |
0:09.0 | My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida. |
0:15.4 | I've got a diary by Brad today talking about, well, the latest news around Quagbot or QBot, as it's sometimes called. |
0:25.5 | This particular infection came thanks to a URL marked at virus total. |
0:32.0 | And as usual, Brad ran the sample, collected traffic and collected with that also indicators of |
0:40.7 | compromise. A couple interesting components from that compromise. First of all, the bot downloads, |
0:48.2 | an encrypted zip file, but then also connects to an HTTP website with a self-signed certificate where the organization |
0:58.0 | name in a certificate, and the common name, is Gifts.com, but a certificate is not actually |
1:05.2 | associated with that site. Maybe the attacker is trying to sort of fool analysts here to see the host name in the |
1:14.4 | certificate and ignore it as harmless, just considering that a user may have just visited that |
1:20.5 | particular site by IP address instead of host name. I'm not really sure why they do it, |
1:25.4 | but that's sort of my best guess. Another thing that's |
1:29.7 | probably worthwhile mentioning again, it's nothing new here, but this particular bot also uses |
1:35.6 | about a dozen different normal sites for connectivity check like rs.gov, oracle.com, Microsoft.com, and others. |
1:45.2 | So those sites are just used by the bot to check connectivity. |
1:50.4 | Should probably not be used as an indicator of compromise and some kind of detection scheme. |
1:57.6 | And if you have more details from lastPass regarding the incident that ultimately led to the theft of some encrypted password wallets, well, the additional details. |
2:10.9 | Note that the initial access actually happened via a compromised developer's workstation. |
2:17.7 | Apparently, the software package Plex, media player, |
2:21.8 | was used in order to gain access to the employee's laptop. |
2:27.2 | And from there, the attacker was essentially using sessions |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.