One Article Review

Accueil - L'article:
Source Fortinet.webp Fortinet
Identifiant 219122
Date de publication 2016-10-24 10:25:12 (vue: 2016-10-24 10:25:12)
Titre Information-stealing Malware Is Spread Via Word Document
Texte Recently we received a SPAM with an attachment, which is a password-protected Word document. Its MD5 is 6619356e9e0c9d2445bf777a8bea5d6a, which is detected as “WM/Agent.60F9!tr” by the Fortinet AntiVirus service. When the document is opened, the attached malicious VB script code is executed and additional malware is created and executed. Based on our analysis, this is information-stealing malware. In this blog, we’ll show you how the malware works, what information is stolen from a victim’s system, and how the stolen data...
Envoyé Oui
Condensat “wm/agent 60f9 6619356e9e0c9d2445bf777a8bea5d6a additional analysis antivirus attached attachment based blog code created data detected document executed fortinet from how information its malicious malware md5 opened password protected received recently script service show spam spread stealing stolen system tr” victim’s we’ll what when which word works
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: