348. Adversaries Hide Malicious Scripts Inside Subtitle Files
Hello everyone!
Adversaries may hide malicious content everywhere, including absolutely legitimate files, so today we'll look at the following technique - Obfuscated Files or Information: Steganography (T1027.003).
In some cases threat actors may use quite common malware, but still use some interesting techniques. Just like in this case.
The adversary leveraged malicious LNK files to run a command, which would extract and execute a malicious script from a subtitle file:
cmd.exe /c type Part2.subtitles.srt | more | findstr /n "^" | findstr "100: 101: 102: 103:" | for /f "tokens=1,* delims=:" %a in ('more') do cmd /c %b
Interesting, right? We can hunt for similar activity:
event_type: "processcreatewin"
AND
proc_file_path: "cmd.exe"
AND
cmdline: ("type" AND "findstr" AND *.srt)
See you tomorrow!

Comments
Post a Comment