273. That's How PDB Paths Help to Uncover Malicious Files

Hello everyone! Let's look at a bit less common way to identify suspicious and malicious software - analyzing program database (PDB) paths. In some cases the adversary really wants us to understand the goals and find the malware. Let's look at an example. A Bookworm malware sample. According to the report , it has the following PDB path: C:\Users\hack\Documents\WhiteFile\LTDIS13n\Release\LTDIS13n.pdb Yes, "hack". So, if your EDR solution collects information about PDB paths, this may be a good detection opportunity: event_type: "processcreatewin" AND proc_file_pdb_path: "hack" Also, make sure to check the report to look at how to use The Unit 42 Attribution Framework in practice. See you tomorrow!