Loading…
Utah’s Premiere Cyber Security Conference
Thursday, October 24 • 1:30pm - 2:30pm
The Megacortex Mysteries

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.
In spring, 2019, Sophos detected a widespread ransomware attack using a malware that calls itself MegaCortex. The ransomware was spread around victims' networks using compromised Domain Admin credentials on domain controller computers to distribute it as if it were a software patch, using WMI. Subsequent analysis into both the attack and the malware itself showed the attack killchain was orchestrated using complex (and somewhat redundant) Windows batch files. The malware also featured a number of anti-analysis features, including a password string that was unique to the sample, and a hardcoded "active" time that analysts discovered: samples would not run in sandboxes unless the system date was changed to a three-hour window starting at around the same time the original attack began. But the MegaCortex phenomenon actually raised more questions than answers. There are significant similarities between the code style and behavior of other malware families in the MegaCortex samples we initially examined. There were also odd connections and false flag ties to completely unrelated malware families that sent researchers down a number of dead end rabbit holes. None of the questions of why the malware had these unique characteristics have been answered, and the low key nature of MegaCortex may mean we'll never understand its creators' motives.

Speakers
AB

Andrew Brandt

Sophos
Andrew Brandt is a former investigative journalist turned malware hunter and network forensicator. He is a principal researcher with Sophos, and also the editor of the SophosLabs Uncut blog. In his spare time he tries to do hardware hacking, builds retrocomputing and retrogaming devices... Read More →


Thursday October 24, 2019 1:30pm - 2:30pm MDT
Track TWO 2nd Floor (Ballroom B)