More Steganography!

A malicious Excel file using steganography was analyzed, revealing embedded XLS sheets and a complex infection chain. The file downloads an HTA file that creates a BAT file, which in turn generates and executes a VBS file. The VBS file fetches a VBA script that creates and runs a PowerShell script. The PowerShell script downloads an image containing a hidden payload delimited by specific tags. The payload is a Base64-encoded PE file, which is decoded and executed as a DLL. The final payload appears to be a Katz stealer. This analysis highlights the use of multiple file types and steganography techniques to evade detection. Author: AlienVault

Related Tags:
dll

T1059.005

T1059.007

T1027.002

HTA

T1204.002

T1547.001

T1059.001

Excel

Associated Indicators:
C92C761A4C5C3F44E914D6654A678953D56D4D3A2329433AFE1710B59C9ACD3A

5A73927D56C0FD4A805489D5817E1AA4FBD491E5A91ED36F4A2BABEF74158912

601C9F4AB0FE48EEA3F852EA9418EB3F0B3D8F99

5730AA469972B91B05AF9424DC17B63130304DBF

2A1B8592EF9E40CF304968F1F1BB206B

15CC16763E16A1239EAC4F78D5E4F316

http://107.172.235.203/245/wecreatedbestsolutionswithniceworkingskill.hta