#maldoc

⚯ Michel de Cryptadamus ⚯cryptadamist@universeodon.com
2025-02-01

@evacide seeing as how it seems like the Paragon attack was executed via maldoc PDFs i'll just mention i created a (surprisingly popular) tool for analyzing (possibly malicious) PDFs after my own unpleasant encounter with such a creature

github.com/michelcrypt4d4mus/p

#paragon #infosec #Whatsapp #PDF #pdfalyzer #Malware #maldoc

screenshot of analyzed PDF
2023-09-04

The embedded Word document contains a VBS macro that is designed to download and install an MSI malware file if opened as a .DOC file in Microsoft Office.

#malware #cybersecurity #PDF #MalDoc

cybersec84.wordpress.com/2023/

ricardo :mastodon:governa@fosstodon.org
2023-09-04

Beware of #MalDoc in #PDF: A New Polyglot Attack Allowing Attackers to Evade Antivirus ⚠️

thehackernews.com/2023/09/bewa

AKG_de_ITMK@troet.cafe
2023-09-03

Polyglots sind Dateien, die zwei unterschiedliche Dateiformate enthalten, die je nach der Anwendung, die sie öffnet, als mehr als ein Dateityp interpretiert und ausgeführt werden können.

Angreifer machen sich das jetzt mit #MalDoc zunutze. t.co/ZBUxxp6Tbz

Marcel SIneM(S)USsimsus@social.tchncs.de
2023-08-30
TechHelpKB.com 📚techhelpkb
2023-08-29

MalDoc in PDF attacks use a combination of Word and PDF files to spread malware tchlp.com/3Z2m1l2

2023-08-29

A Japanese agency managed to detect a ‘#MalDoc in PDF’ attack, involving #PDFs with embedded malicious #Word files that bypass detection by traditional PDF analysis tools.
#Japan #cybersecurity #infosec #malware

cybernews.com/news/jpcert-mald

#MalDoc in #PDF - 検知回避を狙って悪性なWordファイルをPDFファイルへ埋め込む手法」: JPCERTCC

「JPCERT/CCは、7月に発生した攻撃に、検知回避を狙って悪性なWordファイルをPDFファイルへ埋め込む新しいテクニック(以降本記事ではMalDoc in PDFとする)が使用されたことを確認しました。」

blogs.jpcert.or.jp/ja/2023/08/

#prattohome #JPCERTCC

2023-03-06

Struggling with the wave of OneNote #phishing documents? Did you know you can block OneNote from launching an embedded file, which prevents the current wave of phishing docs.
#DFIR #CSIRT #MalDoc
bleepingcomputer.com/news/secu

Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2023-02-06

@SophosXOps All the #OneNote #maldoc documents in this case contain a static image that prompts the user to click a button in response to text that says "This document contains attachments from the cloud, to receive them, double click 'open.'"

When you open the document, it spawns an embedded HTML Application (eg., an .hta file) with an embedded, obfuscated script in the DIV tag. That script retrieves a Qakbot DLL payload from a website and executes the initial infection command. 5/6

Qakbot's .hta scriptThe DIV field in the script is obfuscated; This is what the script looks like when it has been deobfuscated.
Andrew 🌻 Brandt 🐇threatresearch@infosec.exchange
2023-02-06

@SophosXOps #Qakbot's threat actors typically use email messages as their initial attack vector, "injecting" a malicious email into the middle of existing conversational threads, replying to all parties with either a #maldoc attachment or a link to a #malware file.

They're the worst kind of "reply guy" 3/6

An email from the malicious OneNote campaign showing the body content of one of the malicious email messages with a link to a website to download the OneNote file.
Paul Rascagneresr00tbsd@infosec.exchange
2023-01-20

I wrote a small Python library to extract metadata and embedded files in a #OneNote documents (.one). The OneNote file format is not really documented but it seems to work on the files I tested.

It is published on the @volexity GitHub repository: github.com/volexity/threat-int
It can be used in #standalone or included easily on any #pipeline.
#CTI #threathunting #maldoc #maliciousdocuments

2022-12-05

A malicious doc on the name of Colombian GOV spread as a fake lawsuit and enforced collection.
@dimitribest

#CTI #maldoc

4a69b0a3796dd688d57e11658ac1058c <doc
9792c84f24e1492cc4d179523fdfcb9d < vbs
1e989e84f5967d84f40acabaad3395de < Njrat

IoCs:
hxxps://cdn.discordapp.com/attachments/1047544891632259145/1047971566543179936/2dode8002[.]vbs

hxxps://cdn.discordapp.com/attachments/1047543449777344516/1047971253056708729/2dode8002[.]txt

135d1da64932e6f858f7136f8c2b339f

Paul Rascagneresr00tbsd@infosec.exchange
2022-12-01

We published a blog #post about #Lazarus. They are still abusing fake cryptocurrency applications but we also identified #maldoc with #macro (an inception of macros). The purpose is to deploy #AppleJeus variants.

From #reverse point of view, they implemented an uncommon side-loading technique. The malicious DLL is not directly loaded by the IAT of a legit binary, but via a legitimate DLL from the System32 repository. More details on the @volexity blog : volexity.com/blog/2022/12/01/b
#CTI #threatintel #threatintelligence

2022-11-08

Emotet coming in hot - Emotet is a ubiquitous and well-known banking trojan that has evolved over the yea... blog.talosintelligence.com/emo #threatspotlight #crimeware #topstory #securex #emotet #botnet #maldoc

2022-09-28

New campaign uses government, union-themed lures to deliver Cobalt Strike beacons - By Chetan Raghuprasad and Vanja Svajcer. Cisco Talos discovered a malicious campai... blog.talosintelligence.com/202 #informationstealers #cobaltstrike #securex #threats #maldoc

2022-07-14

Transparent Tribe begins targeting education sector in latest campaign - Cisco Talos has been tracking a new malicious campaign operated by the Transparent Tribe ... blog.talosintelligence.com/202 #malware #securex #threats #maldoc #apt

2022-03-29

Transparent Tribe campaign uses new bespoke malware to target Indian government officials - By Asheer Malhotra and Justin Thattil with contributions from Kendall McKay.

Cisco Talos... blog.talosintelligence.com/202 #crimsonrat #malware #securex #maldoc #apt #rat

2022-03-10

Iranian linked conglomerate MuddyWater comprised of regionally focused subgroups - By Asheer Malhotra, Vitor Ventura and Arnaud Zobec.

Cisco Talos has observed new cyber a... blog.talosintelligence.com/202 #muddywater #securex #maldoc #turkey #iran #apt #rat

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst