Actionable threat hunting with Threat Intelligence (I) - Hunting malicious desktop files

May 21, 2025, 8:43 p.m.

Description

This analysis explores the detection of malicious .desktop files used by threat actors to infect Linux systems. It explains the structure of these files and how they are manipulated to obfuscate malicious content. The report details the execution process of these files, which often involve opening PDF files from Google Drive as a distraction while downloading malware. Various threat hunting techniques are presented, including searching for specific processes, command lines, and file contents. The article provides several Google Threat Intelligence queries for identifying suspicious .desktop files and related malicious activities. It also includes a list of recently discovered samples potentially linked to a campaign reported by Zscaler.

Date

  • Created: May 16, 2025, 8:22 a.m.
  • Published: May 16, 2025, 8:22 a.m.
  • Modified: May 21, 2025, 8:43 p.m.

Indicators

  • ef2056a6724ad654e3c36234863ab34b9e0e6fa3e6f31340682c37dc2c5cb32e
  • 7a2f7357ce5ebd03bbf10b856a30706f71eb1586c309aff9169fb5b056791741
  • https://minio.daviduwu.ovh/public/check.sh

Attack Patterns

Additional Informations

  • British Indian Ocean Territory
  • India
  • Australia