Actionable threat hunting with Threat Intelligence (I) - Hunting malicious desktop files
May 21, 2025, 8:43 p.m.
Description
This analysis explores the detection of malicious .desktop files used by threat actors to infect Linux systems. It explains the structure of these files and how they are manipulated to obfuscate malicious content. The report details the execution process of these files, which often involve opening PDF files from Google Drive as a distraction while downloading malware. Various threat hunting techniques are presented, including searching for specific processes, command lines, and file contents. The article provides several Google Threat Intelligence queries for identifying suspicious .desktop files and related malicious activities. It also includes a list of recently discovered samples potentially linked to a campaign reported by Zscaler.
External References
Tags
Date
- Created: May 16, 2025, 8:22 a.m.
- Published: May 16, 2025, 8:22 a.m.
- Modified: May 21, 2025, 8:43 p.m.
Indicators
- ef2056a6724ad654e3c36234863ab34b9e0e6fa3e6f31340682c37dc2c5cb32e
- 7a2f7357ce5ebd03bbf10b856a30706f71eb1586c309aff9169fb5b056791741
- https://minio.daviduwu.ovh/public/check.sh
Additional Informations
- British Indian Ocean Territory
- India
- Australia