Remove 08
Remove 2014 Remove Encryption Remove IT Remove Manufacturing
article thumbnail

Outlaw is Back, a New Crypto-Botnet Targets European Organizations

Security Affairs

As shown in the configuration of the job, the malware prepares a different configuration of task scheduling according to the module and file to be executed: “/a/upd” file is run every 23 days (line 28); “/b/sync” every sunday at 08:05AM (line 29) “/b/sync” at the reboot (line 30) “/c/aptitude” every three days (line 31). The “a” Folder.

Mining 100