Lokibot Uses Image Files to Hide Code for Unpacking Routine
#1
Bug 
Quote:The authors behind LokiBot info-stealer have turned to steganography to add a new layer of obfuscation, the researchers discovered in a recent variant of the malware.
 
LokiBot is currently under active development, with developers adding a bundle of features over the years. 
It can steal browser information from over 25 different products, check for remote administration tools (SSH, VNC, RDP), and find credentials for email and file transfer clients.
 
Researchers at Trend Micro discovered that new strains of LokiBot use image files to hide code needed for its unpacking routine.

Read more here: https://www.bleepingcomputer.com/news/se...g-routine/
[-] The following 2 users say Thank You to silversurfer for this post:
  • darktwilight, harlan4096
Reply


Messages In This Thread
Lokibot Uses Image Files to Hide Code for Unpacking Routine - by silversurfer - 07 August 19, 14:52

Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Surfshark VPN : Award-winning VPN servi...
Surfshark New Pric...jasonX — 10:21
Surfshark VPN : Award-winning VPN servi...
Surfshark New Pric...jasonX — 10:21
AntGROUP Inc. / VCap-developer
Ant Download Manager...jasonX — 10:20
Surfshark VPN : Award-winning VPN servi...
Surfshark Apps Ver...jasonX — 10:07
Mozilla Firefox Browser 150.0.3
Mozilla Firefox Br...harlan4096 — 07:22

[-]
Birthdays
Today's Birthdays
avatar (41)axylisyb
avatar (44)tukrublape
Upcoming Birthdays
avatar (28)akiratoriyama
avatar (48)Jerrycix
avatar (40)awedoli
avatar (82)WinRARHowTo
avatar (38)owysykan
avatar (49)beautgok
avatar (39)axuben
avatar (40)ihijudu
avatar (45)tiojusop
avatar (42)Damiennug
avatar (40)acoraxe
avatar (49)contjrat
avatar (44)knigiJow
avatar (46)1stOnecal
avatar (50)Mirzojap
avatar (36)idilysaju
avatar (40)GregoryRog
avatar (45)mediumog
avatar (40)odukoromu
avatar (46)Joanna4589

[-]
Online Staff
There are no staff members currently online.

>