Login Register






The issue regarding searched threads returning 404s has been fixed. My apologies. - NekoElf
Thread Rating:
  • 0 Vote(s) - 0 Average


Diamond New malware downloads Cobalt Strike via PNG image from Imgur filter_list
Author
Message
New malware downloads Cobalt Strike via PNG image from Imgur #1
Code:
A security researcher using the Arkbird alias talked about a new malware that uses Word files with macros to download PowerShell scripts from GitHub. The script additionally downloads a legitimate file from the Imgur image hosting service to decode the Cobalt Strike payload on Windows systems.

As explained by Arkbird, the malware chain comes as an embedded macro in an outdated Microsoft Word file (* .doc). When you open a Word document, an inline macro is run that runs powershell.exe and passes it the location of the PowerShell script hosted on GitHub. The one-line script has instructions on how to download a real PNG file from the Imgur image hosting service.

While the image itself may be harmless, the pixel values ​​are used by the script when calculating the next stage payload. The payload calculation algorithm runs a foreach loop to iterate over the pixel values ​​in the PNG image and performs certain arithmetic operations to obtain ASCII functional commands.

The decoded script executes the Cobalt Strike payload. According to Arkbird, the payload does communicate with the C&C server through the WinINet module for further instructions.

Some experts have linked this type of malware to the MuddyWater APT group (also known as SeedWorm and TEMP.Zagros), first discovered in 2017 and mainly targeting Middle Eastern organizations.

Source: https://www.securitylab.ru/news/515126.php

Reply

RE: New malware downloads Cobalt Strike via PNG image from Imgur #2
Seems like a lot of major Industries/services have been under attack recently.

You've got to love the vulnerability of the good ol' Microsoft Word document- It's been around for decades.
[Image: AD83g1A.png]

Reply

RE: New malware downloads Cobalt Strike via PNG image from Imgur #3
Thanks hro it’s very very good

Reply

RE: New malware downloads Cobalt Strike via PNG image from Imgur #4
(12-29-2020, 08:37 AM)fsociety Wrote:
Code:
A security researcher using the Arkbird alias talked about a new malware that uses Word files with macros to download PowerShell scripts from GitHub. The script additionally downloads a legitimate file from the Imgur image hosting service to decode the Cobalt Strike payload on Windows systems.

As explained by Arkbird, the malware chain comes as an embedded macro in an outdated Microsoft Word file (* .doc). When you open a Word document, an inline macro is run that runs powershell.exe and passes it the location of the PowerShell script hosted on GitHub. The one-line script has instructions on how to download a real PNG file from the Imgur image hosting service.

While the image itself may be harmless, the pixel values are used by the script when calculating the next stage payload. The payload calculation algorithm runs a foreach loop to iterate over the pixel values in the PNG image and performs certain arithmetic operations to obtain ASCII functional commands.

The decoded script executes the Cobalt Strike payload. According to Arkbird, the payload does communicate with the C&C server through the WinINet module for further instructions.

Some experts have linked this type of malware to the MuddyWater APT group (also known as SeedWorm and TEMP.Zagros), first discovered in 2017 and mainly targeting Middle Eastern organizations.

Source: https://www.securitylab.ru/news/515126.php
This becoming interesting

Reply







Users browsing this thread: 2 Guest(s)