meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS Stormcast Monday, June 16th, 2025: Katz Stealer in JPG; JavaScript Attacks; Reviving expired Discord Invites for Evil

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 16 June 2025

⏱️ 7 minutes

🧾️ Download transcript

Summary


Katz Stealer in JPG
Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer.
https://isc.sans.edu/diary/More+Steganography/32044
https://unit42.paloaltonetworks.com/malicious-javascript-using-jsfiretruck-as-obfuscation/
JavaScript obfuscated with JSF*CK is being used on over 200,000 websites to direct victims to malware
Expired Discord Invite Links Used for Malware Distribution
Expired discord invite links are revived as vanity links to direct victims to malware sites
https://research.checkpoint.com/2025/from-trust-to-threat-hijacked-discord-invites-used-for-multi-stage-malware-delivery/

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Monday, June 16th, 2025 edition of the Sands Internet Storm Center's Stormcast.

0:08.6

My name is Johannes Ulrich, and this episode brought you by the Sands.edu credit certificate program in cloud security is recorded in Jacksonville, Florida.

0:20.7

Well, in diaries this weekend, we had a diary by Xavier looking at yet another Malware

0:25.2

sample that uses images to hide executables.

0:29.6

This one starts out as, well, your usual Microsoft Excel macro, so nothing really all

0:35.9

that excited here, and OlliDump does a good job in actually

0:41.0

then extracting the relevant data from this particular Excel spreadsheet. Now, where it gets

0:49.0

more interesting then is the second stage here. There is an HTML application that's being loaded that,

0:57.5

well, again, so you use at least a file name kind of to obfuscate what it's doing,

1:04.8

and it is loading a bad file, and this bad file then does download an image. Now, quite a bit of interesting sort of

1:14.4

simple obfuscation happening here, but Xavier will walk you through how to actually

1:20.7

figure out what's happening until you end up with this particular image. This is a JPEC image.

1:28.6

Now, we had in the last couple examples, PNG images.

1:33.2

In PNG images, we have that end indicator,

1:36.1

and then we can just add any data after this indicator.

1:40.8

In this particular case, it works a little bit different. There is this NCO and then

1:47.8

FEM indicator here. These tags basically enclose the executable, so you don't actually

1:54.5

necessarily have to add it to the end. It's a base 64 encoded piece of data here. And as Xavier points out, this TVQQ add-at

2:06.7

part, that really then basically does decode to your standard PE file header. And, well, that's then

2:15.6

just the actual payload DLL that is being loaded and executed.

2:21.1

So interesting walk through here how to very quickly analyze a piece of malware like this

2:27.1

even though it went through a couple different stages and yes some obvious scation here.

...

Transcript will be available on the free plan in 27 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.