New GZipDe Malware Drops Metasploit Backdoor

Discussion in 'malware problems & news' started by stapp, Jun 22, 2018.

  1. stapp

    stapp Global Moderator

    Joined:
    Jan 12, 2006
    Posts:
    27,622
    Location:
    UK
  2. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    18,178
    Location:
    The Netherlands
    What they don't tell is how to block the in-memory Metasploit payload, isn't it true that it runs inside a certain process, like powershell.exe? So if you restrict these processes, it shouldn't be able to perform certain activities. I hate it when they don't explain this stuff.
     
  3. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,649
    Location:
    U.S.A.
    Based on the below, it appears to be a classical PowerShell based .Net attack. Monitoring PowerShell execution would have stopped it. If not so, setting PowerShell to Constrained Language mode would have stopped it. Also, blocking any outbound network traffic from PowerShell would have stopped it.

    Once the payload is loaded into memory and executed, the only thing that will stop it is if your security product has a memory scanner and a sig for the payload. Since this post-execution detection, the malware could have done system modification or data harvesting activities prior to detection. Again, you need to stop this type of malware prior to payload execution.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.