InQuest Blog

Threat-hunting, malware, ransomware, vulnerability analysis and news from authors of InQuest.

Walkthrough of a Common Malware Carrier

Posted on 2018-04-19 by Pedram Amini

E-mail is a prominent vector for malware delivery, by way of a malicious URL or file attachments. When embedding malicious content within a file, malware authors commonly nest a variety of formats within one another and pivot through numerous stages of payloads before retrieving the final one. In this post, we'll walk through the dissection of a common document malware carrier.

GandCrab Swarm

Posted on 2018-04-17 by Pedram Amini

In early April of 2018 we noticed a spike in malicious activity, sourced mostly from the Asias and delivered via SMTP. This post covers our exploration of the campaign and the eventual realization that it is responsible for distributing a mix of garden variety malware, including GandCrab ransomware. If you've been infected, check out this free decrypter. For technical readers, check out @hasherezade's GandCrab IDA Python string deobfuscator utility on GitHub.

InQuest Provides Zero-Day Coverage Against Advanced Threats via Partner Exodus Intel

Posted on 2018-03-23 by Anindo Mukherjee

Threat intelligence is only as good as the sources that drive it, which is why InQuest integrates 0-day vulnerability detection into our product via research from Exodus Intelligence. Going beyond public vulns and in-the-wild samples, this level of coverage affords protection against new TTPs, long before they become part of the known threat landscape.

Defense in Depth: Detonation Technologies

Posted on 2018-03-12 by Ryan Shipp

We believe that any security stack, in essence, follows the Swiss cheese model. With each slice of cheese representing a security product, and each hole representing some bypass or evasion. Following best practices and employing a Defense-in-Depth model results in a stacking of these slices, each additional stack reducing the exposure window and minimizing the overall risk to a computing environment.

An Introduction to Deep File Inspection

Posted on 2018-02-12 by Anindo Mukherjee

Modern "fileless" malware campaigns increasingly use specially crafted documents as attack vectors. This allows a malicious file to harbor a payload distinct from executable droppers, and can have its text content easily modified in a phishing campaign without having to alter the nested objects it contains. Deep File Inspection presents a methodology to unwrap these nested files and objects, and classify documents based on their intent; flagging malicious files based on the subsets of functionality they're using.