356. Adversaries Abuse Archive.org to Store Maicious PNG Files
Hello everyone! You may be a bit tired of various legitimate web-services abused by adversaries, but such services are always good targets for hunting, so let's look at another example. This time adversaries leveraged Archive[.]org to store a malicous PNG files, for example: hxxp://dn710107.ca.archive[.]org/0/items/msi-pro-with-b-64_20251208_1511/MSI_PRO_with_b64[.]png Such files contained a steganographically embedded base64-encoded .NET assembly hidden at the end of the file. Also, to download and execute it, the adversary used PowerShell. Knowing all of this, we can builad a hunting query: event_type: "dnsreqwin" AND dns_rname: "archive.org" AND proc_file_path: "powershell.exe" See you tomorrow!