This infection contains many stages and largely depends on the C2 server, which stores the required files for each stage. The attacker also uses a password-protected .xls file to lower the detection rate.
Related Stories
February 4, 2023
February 4, 2023
February 4, 2023