Source |
Fortinet |
Identifiant |
379375 |
Date de publication |
2017-06-28 16:15:52 (vue: 2017-06-28 16:15:52) |
Titre |
In-Depth Analysis of .NET Malware JavaUpdtr |
Texte |
FortiGuard Labs recently captured some malware which was developed with the Microsoft .Net framework. I analyzed one of them, and in this blog, I'm going to show you how it is able to steal information from a victim's machine.
The malware was spread via a Microsoft Word document that contained an auto-executable malicious VBA Macro. Figure 1 below shows how it looks when it's opened.
Figure 1. When the malicious Word document is opened
What the VBA code does
Once you click the “Enable Contentâ€... |
Notes |
|
Envoyé |
Oui |
Condensat |
able analysis analyzed auto below blog captured click code contained content†depth developedâ with document does executable figure fortiguard framework from going how information javaupdtr labs looks machine macro malicious malware microsoft net once one opened recently show shows some spread steal them vba victim what when which word “enable |
Tags |
|
Stories |
|
Move |
|