Source |
The Hacker News |
Identifiant |
4358682 |
Date de publication |
2022-03-29 03:07:06 (vue: 2022-03-29 11:05:50) |
Titre |
Experts Detail Virtual Machine Used by Wslink Malware Loader for Obfuscation |
Texte |
Cybersecurity researchers have shed more light on a malicious loader that runs as a server and executes received modules in memory, laying bare the structure of an "advanced multi-layered virtual machine" used by the malware to fly under the radar.
Wslink, as the malicious loader is called, was first documented by Slovak cybersecurity company ESET in October 2021, with very few telemetry hits |
Notes |
|
Envoyé |
Oui |
Condensat |
2021 advanced bare called company cybersecurity detail eset executes experts first documented by fly have hits layered laying light loader machine malicious malware memory modules more multi obfuscation october radar received researchers runs server shed slovak structure telemetry under used very virtual wslink |
Tags |
Malware
|
Stories |
|
Move |
|