Tracking Malware Campaigns With Reused Material, (Wed, Feb 18th)
A few days ago I wrote a diary called "Malicious Script Delivering More Maliciousness"[1]. In the malware infection chain, there was a JPEG picture that embedded the last payload delimited with "BaseStart-" and "-BaseEnd" tags.
AI Analysis
Technical Summary
This malware campaign leverages a multi-stage infection chain beginning with a malicious Office document named "TELERADIO_IB_OBYEKTLRIN_BURAXILIS_FORMASI.xIs" which exploits the well-known Equation Editor vulnerability CVE-2017-11882. This exploit triggers the download of an HTA (HTML Application) file from a suspicious IP address. The HTA file executes a PowerShell script that subsequently downloads a JPEG image from another IP address. This JPEG image is not a typical image but contains an embedded Base64-encoded payload delimited by the tags "BaseStart-" and "-BaseEnd". The embedded payload is a .NET binary that is obfuscated with Unicode characters to hinder analysis. The campaign is notable for reusing the same JPEG image across multiple attacks, enabling tracking of related malware activities through image similarity and YARA rules. The .NET payload likely performs malicious actions once executed, although specific behaviors are not detailed in the source. The infection chain's reliance on an older exploit (CVE-2017-11882) suggests that systems unpatched since 2017 remain vulnerable. The campaign does not currently have known widespread exploitation in the wild but demonstrates a sophisticated approach to payload delivery and evasion. The reuse of the image and the embedding technique indicates an attempt to evade detection and complicate forensic analysis. The campaign was analyzed and reported by the SANS Internet Storm Center, with detailed technical insights and indicators of compromise such as SHA256 hashes for the malicious files.
Potential Impact
European organizations face a medium-level risk from this campaign primarily due to the exploitation of a legacy vulnerability that may still exist in unpatched Office environments. Successful exploitation could lead to remote code execution, allowing attackers to deploy further malware, conduct espionage, or establish persistence. The multi-stage nature complicates detection and response, increasing the risk of prolonged undetected compromise. Organizations in sectors with heavy Office document usage, such as government, finance, and healthcare, are particularly at risk. The use of publicly accessible IP addresses for payload hosting means that attackers can dynamically change infrastructure, complicating blocking efforts. The embedding of payloads within images can bypass traditional signature-based detection, increasing the chance of infection. While no known widespread exploitation is reported, the campaign's reuse of payload delivery methods suggests ongoing or evolving threats. The impact on confidentiality, integrity, and availability depends on the final payload's capabilities but could be significant if the .NET binary enables lateral movement or data exfiltration.
Mitigation Recommendations
1. Ensure all Microsoft Office installations are fully patched, specifically addressing CVE-2017-11882, to eliminate the initial exploit vector. 2. Implement advanced email filtering to block suspicious attachments, especially those with uncommon extensions like .xIs or HTA files. 3. Deploy endpoint detection and response (EDR) solutions capable of detecting obfuscated PowerShell scripts and unusual image file behaviors, including Base64 payload extraction. 4. Use YARA rules targeting the reused JPEG image and associated payload hashes to detect and block known malicious files. 5. Monitor network traffic for connections to suspicious IP addresses identified in the campaign and block or alert on such communications. 6. Educate users on the risks of opening unsolicited Office documents and executing embedded scripts. 7. Employ application whitelisting to prevent execution of unauthorized HTA and PowerShell scripts. 8. Conduct regular threat hunting exercises focusing on indicators related to this campaign, including the specific SHA256 hashes and image-based payload embedding techniques. 9. Maintain robust backup and incident response plans to quickly recover from potential infections. 10. Collaborate with threat intelligence sharing platforms to stay updated on evolving tactics related to this campaign.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Italy, Spain, Poland
Tracking Malware Campaigns With Reused Material, (Wed, Feb 18th)
Description
A few days ago I wrote a diary called "Malicious Script Delivering More Maliciousness"[1]. In the malware infection chain, there was a JPEG picture that embedded the last payload delimited with "BaseStart-" and "-BaseEnd" tags.
AI-Powered Analysis
Technical Analysis
This malware campaign leverages a multi-stage infection chain beginning with a malicious Office document named "TELERADIO_IB_OBYEKTLRIN_BURAXILIS_FORMASI.xIs" which exploits the well-known Equation Editor vulnerability CVE-2017-11882. This exploit triggers the download of an HTA (HTML Application) file from a suspicious IP address. The HTA file executes a PowerShell script that subsequently downloads a JPEG image from another IP address. This JPEG image is not a typical image but contains an embedded Base64-encoded payload delimited by the tags "BaseStart-" and "-BaseEnd". The embedded payload is a .NET binary that is obfuscated with Unicode characters to hinder analysis. The campaign is notable for reusing the same JPEG image across multiple attacks, enabling tracking of related malware activities through image similarity and YARA rules. The .NET payload likely performs malicious actions once executed, although specific behaviors are not detailed in the source. The infection chain's reliance on an older exploit (CVE-2017-11882) suggests that systems unpatched since 2017 remain vulnerable. The campaign does not currently have known widespread exploitation in the wild but demonstrates a sophisticated approach to payload delivery and evasion. The reuse of the image and the embedding technique indicates an attempt to evade detection and complicate forensic analysis. The campaign was analyzed and reported by the SANS Internet Storm Center, with detailed technical insights and indicators of compromise such as SHA256 hashes for the malicious files.
Potential Impact
European organizations face a medium-level risk from this campaign primarily due to the exploitation of a legacy vulnerability that may still exist in unpatched Office environments. Successful exploitation could lead to remote code execution, allowing attackers to deploy further malware, conduct espionage, or establish persistence. The multi-stage nature complicates detection and response, increasing the risk of prolonged undetected compromise. Organizations in sectors with heavy Office document usage, such as government, finance, and healthcare, are particularly at risk. The use of publicly accessible IP addresses for payload hosting means that attackers can dynamically change infrastructure, complicating blocking efforts. The embedding of payloads within images can bypass traditional signature-based detection, increasing the chance of infection. While no known widespread exploitation is reported, the campaign's reuse of payload delivery methods suggests ongoing or evolving threats. The impact on confidentiality, integrity, and availability depends on the final payload's capabilities but could be significant if the .NET binary enables lateral movement or data exfiltration.
Mitigation Recommendations
1. Ensure all Microsoft Office installations are fully patched, specifically addressing CVE-2017-11882, to eliminate the initial exploit vector. 2. Implement advanced email filtering to block suspicious attachments, especially those with uncommon extensions like .xIs or HTA files. 3. Deploy endpoint detection and response (EDR) solutions capable of detecting obfuscated PowerShell scripts and unusual image file behaviors, including Base64 payload extraction. 4. Use YARA rules targeting the reused JPEG image and associated payload hashes to detect and block known malicious files. 5. Monitor network traffic for connections to suspicious IP addresses identified in the campaign and block or alert on such communications. 6. Educate users on the risks of opening unsolicited Office documents and executing embedded scripts. 7. Employ application whitelisting to prevent execution of unauthorized HTA and PowerShell scripts. 8. Conduct regular threat hunting exercises focusing on indicators related to this campaign, including the specific SHA256 hashes and image-based payload embedding techniques. 9. Maintain robust backup and incident response plans to quickly recover from potential infections. 10. Collaborate with threat intelligence sharing platforms to stay updated on evolving tactics related to this campaign.
Affected Countries
Technical Details
- Article Source
- {"url":"https://isc.sans.edu/diary/rss/32726","fetched":true,"fetchedAt":"2026-02-18T08:29:42.699Z","wordCount":417}
Threat ID: 6995787680d747be205506ca
Added to database: 2/18/2026, 8:29:42 AM
Last enriched: 2/18/2026, 8:29:56 AM
Last updated: 2/21/2026, 12:18:57 AM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-02-20
MediumAndroid threats using GenAI usher in a new era
MediumMaltrail IOC for 2026-02-20
MediumFBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025
MediumPromptSpy Android Malware Abuses Gemini AI at Runtime for Persistence
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.