4.9 • 696 Ratings
🗓️ 9 October 2025
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | Hello and welcome to the Thursday, October 9th, 2025 edition of the Sands Internet Storm Centers. |
| 0:11.2 | Stormcast, my name is Johannes Ulrich, recording today from Denver, Colorado. |
| 0:17.4 | And this episode is brought you by the Sands.edu master's degree program in information security |
| 0:23.5 | engineering. Xavier again went out hunting for a malware on virus total and came across an |
| 0:30.1 | interesting Python script. That's actually polymorphic. Polymorphic code modifies itself |
| 0:36.3 | as it runs. The intent here is usually to evade signatures that may otherwise detect the malware. |
| 0:44.3 | Well, this turned out to be a remote access tool, a rat, and it took advantage of the Python Inspect module. |
| 0:51.3 | That module allows you to read the code from various functions and then, of course, |
| 0:57.4 | modified, and it's then being executed using the exec function in Python that will execute |
| 1:03.0 | the resulting string. It not only modifies code by, for example, exoring it and then decoding |
| 1:09.6 | it, but it also injects random junk code, |
| 1:13.7 | which will again mostly be used to full detection algorithms to not detect this particular malware. |
| 1:21.4 | So far, that seems to be somewhat successful with only two antivirus tools detecting it on virus total. Otherwise, this is your |
| 1:31.1 | standard rat. It has the standard functionality like keystroke loggers, reporting, retrieving |
| 1:36.4 | files, and the like. So it's certainly possibly dangerous malware. Whether or not this was |
| 1:43.2 | actually used in attack or is really sort of |
| 1:45.6 | a proof of concept, of course, is open at this point. And in vulnerabilities, we have a little bit |
| 1:51.4 | an odd vulnerability to start out with. It's not very severe, but I still decide to include it |
| 1:59.1 | because it's interesting how the vulnerability is being exploited |
| 2:02.7 | and also it affects SSH, which of course is a very widely used tool for secure remote access. |
| 2:11.6 | The problem with this vulnerability is the proxy command directive in SSH. |
| 2:23.3 | The intent of the proxy command directive is to, well, execute code before the connection is established. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.