Source |
Fortinet |
Identifiant |
219122 |
Date de publication |
2016-10-24 10:25:12 (vue: 2016-10-24 10:25:12) |
Titre |
Information-stealing Malware Is Spread Via Word Document |
Texte |
Recently we received a SPAM with an attachment, which is a password-protected Word document. Its MD5 is 6619356e9e0c9d2445bf777a8bea5d6a, which is detected as “WM/Agent.60F9!tr” by the Fortinet AntiVirus service. When the document is opened, the attached malicious VB script code is executed and additional malware is created and executed.
Based on our analysis, this is information-stealing malware. In this blog, we’ll show you how the malware works, what information is stolen from a victim’s system, and how the stolen data... |
Notes |
|
Envoyé |
Oui |
Condensat |
“wm/agent 60f9 6619356e9e0c9d2445bf777a8bea5d6a additional analysis antivirus attached attachment based blog code created data detected document executed fortinet from how information its malicious malware md5 opened password protected received recently script service show spam spread stealing stolen system tr” victim’s we’ll what when which word works |
Tags |
|
Stories |
|
Move |
|