273. That's How PDB Paths Help to Uncover Malicious Files

Hello everyone!

Let's look at a bit less common way to identify suspicious and malicious software - analyzing program database (PDB) paths.

In some cases the adversary really wants us to understand the goals and find the malware. Let's look at an example. A Bookworm malware sample. According to the report, it has the following PDB path:

C:\Users\hack\Documents\WhiteFile\LTDIS13n\Release\LTDIS13n.pdb

Yes, "hack". So, if your EDR solution collects information about PDB paths, this may be a good detection opportunity:

event_type: "processcreatewin"

AND

proc_file_pdb_path: "hack"

Also, make sure to check the report to look at how to use The Unit 42 Attribution Framework in practice.

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge