5/25/2023 0 Comments Bag boy lover boy download![]() We will shed light on the custom protocol used by the Cybergate RAT.īelow is the detection timeline for AutoIt malware campaigns in the past month. We also observed the usage of custom C&C protocols to exfiltrate sensitive information. ![]() This blog will walk you through a detailed analysis of the payload delivery mechanism, capabilities, and Command and Control (C&C) communication. Along similar lines, we recently came across a new malware campaign that uses a similar AutoIt script to deliver a new variant of the CyberGate RAT and RedLine stealer. ![]() In our most recent blog, we had detailed a malware campaign that uses a malicious document (DOC) file to deliver an AutoIt script which, in turn, delivers the Taurus stealer to steal credentials, cookies, history, system info, and more.
0 Comments
Leave a Reply. |