Today > 1 Critical | 6 High | 24 Medium vulnerabilities   -   You can now download lists of IOCs here!

Potential ZERO-DAY, Attackers Use Corrupted Files to Evade Detection

Dec. 4, 2024, 10:21 a.m.

Description

A sophisticated ongoing attack has been discovered that evades antivirus software, prevents sandbox uploads, and bypasses Outlook's spam filters. The attackers deliberately corrupt files to conceal their type, making detection difficult for security tools. These corrupted files, often identified as ZIP archives or MS Office files, operate successfully within the OS but remain undetected by most security solutions. The attack exploits the recovery mechanisms of 'damaged' files in programs like Microsoft Word, Outlook, and WinRAR. The campaign has been active for several months, with the earliest instances dating back to August. The ANYRUN sandbox's interactivity allows it to identify this malicious behavior by launching the broken files in their corresponding programs.

Date

Published: Dec. 4, 2024, 10:06 a.m.

Created: Dec. 4, 2024, 10:06 a.m.

Modified: Dec. 4, 2024, 10:21 a.m.

Indicators

bb2a18fb5501fb17f5199ed5c761cb8464ae0fef029fdbc22e1061eed59e8c80

4792634a0554e7a35bf6908d5f5c53a39a44e71826ad0f693f3dd66896eb8ce6

154.216.17.193

zekadilrominxisgh33823ucne.org

friendrisetemlin.org

bc1qlpk73pgj3dz02nq8d9kpdxk.org

Attack Patterns

T1036.001

T1027.001

T1211

T1204.002

T1489

T1559

T1036

T1140

T1027