273. That's How PDB Paths Help to Uncover Malicious Files
Hello everyone!
Let's look at a bit less common way to identify suspicious and malicious software - analyzing program database (PDB) paths.
In some cases the adversary really wants us to understand the goals and find the malware. Let's look at an example. A Bookworm malware sample. According to the report, it has the following PDB path:
C:\Users\hack\Documents\WhiteFile\LTDIS13n\Release\LTDIS13n.pdb
Yes, "hack". So, if your EDR solution collects information about PDB paths, this may be a good detection opportunity:
event_type: "processcreatewin"
AND
proc_file_pdb_path: "hack"
Also, make sure to check the report to look at how to use The Unit 42 Attribution Framework in practice.
See you tomorrow!

Comments
Post a Comment