Jazi Profile picture
Threat Intel researcher @malwarebytes @MBThreatIntel. Special interest in tracking APTs. Tweets are my own and do not reflect my employer
Aug 25, 2021 4 tweets 3 min read
Some updates on this suspected #Lazarus #APT:(thread, 1/4)
1) The remote template is VBA stomped or at least it was able to hide itself from olevba and oledump
2) The remote template drops an obfuscated vbs file and registers it as a scheduled service
3) All the strings in "OneDriveUpdateNew.vbs" are obfuscated and are decoded using "string_decoder" function with a hardcoded key table.

You can see the decoder and list of the decoded strings used by this vbs file here:
github.com/HHJazi/APT
2/4