• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

This New Fileless Malware Hides Shellcode in Windows Event Logs

You are here: Home / General Cyber Security News / This New Fileless Malware Hides Shellcode in Windows Event Logs
May 7, 2022

Windows Event Log Malware ShellCode

A new destructive campaign has been spotted having benefit of Windows event logs to stash chunks of shellcode for the 1st time in the wild.

“It permits the ‘fileless’ previous stage trojan to be concealed from plain sight in the file method,” Kaspersky researcher Denis Legezo claimed in a specialized write-up revealed this week.

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The stealthy an infection process, not attributed to a identified actor, is considered to have commenced in September 2021 when the supposed targets have been lured into downloading compressed .RAR files containing Cobalt Strike and Silent Crack.

The adversary simulation software program modules are then utilized as a launchpad to inject code into Windows process processes or dependable programs.

Also notable is the use of anti-detection wrappers as aspect of the toolset, suggesting an endeavor on the portion of the operators to fly beneath the radar.

Windows Event Log Malware ShellCode

Just one of the critical procedures is to keep encrypted shellcode that contains the following-phase malware as 8KB pieces in party logs, a in no way-before-noticed method in real-entire world attacks, that’s then merged and executed.

Windows Event Log Malware ShellCode

The remaining payload is a set of trojans that hire two various conversation mechanisms — HTTP with RC4 encryption and unencrypted with named pipes — which make it possible for it to operate arbitrary commands, obtain data files from a URL, escalate privileges, and take screenshots.

A different indicator of the risk actor’s evasion tactics is the use of facts gleaned from first reconnaissance to produce succeeding phases of the attack chain, together with the use of a remote server that mimics reputable software package applied by the target.

“The actor driving this marketing campaign is pretty capable,” Legezo said. “The code is fairly unique, with no similarities to acknowledged malware.”

The disclosure will come as Sysdig scientists demonstrated a way to compromise go through-only containers with fileless malware that is executed in-memory by leveraging a critical flaw in Redis servers.

Uncovered this post attention-grabbing? Abide by THN on Fb, Twitter  and LinkedIn to browse far more special written content we put up.


Some areas of this post are sourced from:
thehackernews.com

Previous Post: «qnap releases firmware patches for 9 new flaws affecting nas QNAP Releases Firmware Patches for 9 New Flaws Affecting NAS Devices

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • This New Fileless Malware Hides Shellcode in Windows Event Logs
  • QNAP Releases Firmware Patches for 9 New Flaws Affecting NAS Devices
  • Data breach Discovered at IKEA Canada impacts 95,000 Customers
  • NIST Updates Supply Chain Cybersecurity Guidance
  • Apple, Google, Microsoft expand their support for password-less sign-ins
  • Landmark amendments to international cyber crime treaty set to be signed next week
  • Dell calls time on the age-old on-prem vs cloud rivalry
  • USB-based Wormable Malware Targets Windows Installer
  • Researchers Warn of ‘Raspberry Robin’ Malware Spreading via External Drives
  • Ukrainians DDoS Russian Vodka Supply Chains

Copyright © TheCyberSecurity.News, All Rights Reserved.