Fake BSOD Delivered by Malicious Python Script, (Fri, Feb 14th)

SANS Internet Storm Center, InfoCON: green 2025-02-14

Summary:

I found a Python script that implements a funny anti-analysis trick. The script has a low score on VT (4/59) (SHA256:d716c2edbcdb76c6a6d31b21f154fee7e0f8613617078b69da69c8f4867c9534)&#;x26;#;x5b;1&#;x26;#;x5d;. This sample attracted my attention because it uses the tkinter&#;x26;#;x5b;2&#;x26;#;x5d; library.&#;x26;#;xc2;&#;x26;#;xa0;This&#;x26;#;xc2;&#;x26;#;xa0;library&#;x26;#;xc2;&#;x26;#;xa0;is used to create graphical user interfaces (GUIs). It provides tools to create windows, dialogs, buttons, labels, text fields, and other interactive elements, allowing developers to build desktop applications with visual interfaces in Python. Most Python scripts are intended to be executed from a command line. That&#;x26;#;39;s why I consider this library as a good sign of suspicious behavior (It does not mean that all Python scripts using this library are malicious!)

Link:

https://isc.sans.edu/diary/rss/31686

From feeds:

Intel Hub ยป T01 - SANS Internet Storm Center, InfoCON: green

Tags:

Date tagged:

02/14/2025, 11:18

Date published:

02/14/2025, 07:18