Potential ZERO-DAY, Attackers Use Corrupted Files to Evade Detection
Dec. 4, 2024, 10:21 a.m.
Tags
External References
Description
A sophisticated ongoing attack has been discovered that evades antivirus software, prevents sandbox uploads, and bypasses Outlook's spam filters. The attackers deliberately corrupt files to conceal their type, making detection difficult for security tools. These corrupted files, often identified as ZIP archives or MS Office files, operate successfully within the OS but remain undetected by most security solutions. The attack exploits the recovery mechanisms of 'damaged' files in programs like Microsoft Word, Outlook, and WinRAR. The campaign has been active for several months, with the earliest instances dating back to August. The ANYRUN sandbox's interactivity allows it to identify this malicious behavior by launching the broken files in their corresponding programs.
Date
Published: Dec. 4, 2024, 10:06 a.m.
Created: Dec. 4, 2024, 10:06 a.m.
Modified: Dec. 4, 2024, 10:21 a.m.
Indicators
bb2a18fb5501fb17f5199ed5c761cb8464ae0fef029fdbc22e1061eed59e8c80
4792634a0554e7a35bf6908d5f5c53a39a44e71826ad0f693f3dd66896eb8ce6
154.216.17.193
zekadilrominxisgh33823ucne.org
friendrisetemlin.org
bc1qlpk73pgj3dz02nq8d9kpdxk.org
Attack Patterns
T1036.001
T1027.001
T1211
T1204.002
T1489
T1559
T1036
T1140
T1027