356. Adversaries Abuse Archive.org to Store Maicious PNG Files
Hello everyone!
You may be a bit tired of various legitimate web-services abused by adversaries, but such services are always good targets for hunting, so let's look at another example.
This time adversaries leveraged Archive[.]org to store a malicous PNG files, for example:
hxxp://dn710107.ca.archive[.]org/0/items/msi-pro-with-b-64_20251208_1511/MSI_PRO_with_b64[.]png
Such files contained a steganographically embedded base64-encoded .NET assembly hidden at the end of the file. Also, to download and execute it, the adversary used PowerShell.
Knowing all of this, we can builad a hunting query:
event_type: "dnsreqwin"
AND
dns_rname: "archive.org"
AND
proc_file_path: "powershell.exe"
See you tomorrow!

Comments
Post a Comment