4.9 • 696 Ratings
🗓️ 20 November 2024
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Wednesday, November 20th, 24 edition of the Santernet Storm Center's |
0:07.6 | Stormcast. My name is Johannes Orich and I'm recording from Singapore. In diaries today, we have |
0:15.9 | Xavier looking at, well, some recent Python mal malware that he found. |
0:21.6 | This particular Python malware is unique in a couple of ways. |
0:24.6 | First of all, it runs in Windows and Linux, and then it attempts to detect whether or not it's |
0:30.6 | running in a debugger in both operating systems. |
0:34.6 | In Windows, there are a couple standard ways of doing that. |
0:38.3 | The particular malware here is using the Microsoft API call is debugger present, which is made |
0:45.7 | available in Python via the respective C-types WinDL-DL, Colonel 32 Library. |
0:53.8 | In Linux, well, there is no rules of quick standard way like this, but of course you can |
0:59.3 | still detect whether or not you are running inside a debugger. |
1:03.7 | The particular methodology that's being used by this script is to check the Proxelph status file. It does include a line with a tracer PID. This is not zero |
1:16.9 | if the program is running inside S-Trades, which of course is a common tool used in order to reverse |
1:25.3 | software like this. Beyond that, it's not clear what this particular malware is doing. |
1:30.2 | Xavier is still analyzing it. |
1:31.8 | The particular bytecode that is being used here doesn't quite appear to work. |
1:37.3 | Could still be some malware under development. |
1:39.9 | The virus total score is pretty low with 2 out of 64. |
1:47.0 | Last week, Palo Alto did publish this advisory that I've mentioned before that hinted that there is exploit going around for at that point unknown vulnerability. |
2:00.0 | And Palo Alto did recommend isolating the admin interface. |
2:05.0 | Well, we now have more details from Palo Alto and also patches. |
2:10.3 | There are two distinct vulnerabilities, the one is an authentication bypass vulnerability in PanOS that does allow unauthenticated attackers to gain administrator |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.