Potential ZERO-DAY, Attackers Use Corrupted Files to Evade Detection

Dec. 4, 2024, 10:21 a.m.

Description

A sophisticated ongoing attack has been discovered that evades antivirus software, prevents sandbox uploads, and bypasses Outlook's spam filters. The attackers deliberately corrupt files to conceal their type, making detection difficult for security tools. These corrupted files, often identified as ZIP archives or MS Office files, operate successfully within the OS but remain undetected by most security solutions. The attack exploits the recovery mechanisms of 'damaged' files in programs like Microsoft Word, Outlook, and WinRAR. The campaign has been active for several months, with the earliest instances dating back to August. The ANYRUN sandbox's interactivity allows it to identify this malicious behavior by launching the broken files in their corresponding programs.

Date

  • Created: Dec. 4, 2024, 10:06 a.m.
  • Published: Dec. 4, 2024, 10:06 a.m.
  • Modified: Dec. 4, 2024, 10:21 a.m.

Indicators

  • bb2a18fb5501fb17f5199ed5c761cb8464ae0fef029fdbc22e1061eed59e8c80
  • 4792634a0554e7a35bf6908d5f5c53a39a44e71826ad0f693f3dd66896eb8ce6
  • 154.216.17.193
  • zekadilrominxisgh33823ucne.org
  • friendrisetemlin.org
  • bc1qlpk73pgj3dz02nq8d9kpdxk.org