Malware researcher reverse engineered a threat that went undetected for at least 2 years
Security Affairs
AUGUST 20, 2018
The Sample (SHA256: e5c67daef2226a9e042837f6fad5b338d730e7d241ae0786d091895b2a1b8681) presents itself as a JAR file. reg file to enumerate tons of security tools that have been widely used by analysts to analyze Malware. The attacker enumerates 571 possible analysis tools that should not be present on the target machine (Victim).
Let's personalize your content