356. Adversaries Abuse Archive.org to Store Maicious PNG Files

Hello everyone!

You may be a bit tired of various legitimate web-services abused by adversaries, but such services are always good targets for hunting, so let's look at another example.

This time adversaries leveraged Archive[.]org to store a malicous PNG files, for example:

hxxp://dn710107.ca.archive[.]org/0/items/msi-pro-with-b-64_20251208_1511/MSI_PRO_with_b64[.]png

Such files contained a steganographically embedded base64-encoded .NET assembly hidden at the end of the file. Also, to download and execute it, the adversary used PowerShell.

Knowing all of this, we can builad a hunting query:

event_type: "dnsreqwin"

AND

dns_rname: "archive.org"

AND

proc_file_path: "powershell.exe"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge