Remove 08
article thumbnail

Malware researcher reverse engineered a threat that went undetected for at least 2 years

Security Affairs

During the analysis time, only really few Antivirus (6 out of 60) were able to “detect” the sample. The attacker enumerates 571 possible analysis tools that should not be present on the target machine (Victim). reg) analysis program. Multiple programming styles have been found during the analysis path.

article thumbnail

Outlaw is Back, a New Crypto-Botnet Targets European Organizations

Security Affairs

Now, Shellbot has re-appeared in the threat landscape in a recent campaign, targeting organizations worldwide with a new IRC server and new Monero pools, so we decided to deepen the analysis. Technical Analysis. Technical details, including IoCs and Yara Rules, are available in the analysis published in the Yoroi blog.

Mining 104