Lokibot Uses Image Files to Hide Code for Unpacking Routine
#1
Bug 
Quote:The authors behind LokiBot info-stealer have turned to steganography to add a new layer of obfuscation, the researchers discovered in a recent variant of the malware.
 
LokiBot is currently under active development, with developers adding a bundle of features over the years. 
It can steal browser information from over 25 different products, check for remote administration tools (SSH, VNC, RDP), and find credentials for email and file transfer clients.
 
Researchers at Trend Micro discovered that new strains of LokiBot use image files to hide code needed for its unpacking routine.

Read more here: https://www.bleepingcomputer.com/news/se...g-routine/
[-] The following 2 users say Thank You to silversurfer for this post:
  • darktwilight, harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Sysinternals Suite 3.26.2026
What's New (March ...harlan4096 — 11:40
AxCrypt 3.0.0.83
AxCrypt 3.0.0.83: ...harlan4096 — 11:39
Microsoft Edge 146.0.3856.84
Version 146.0.3856...harlan4096 — 11:37
PowerToys 0.98.1
Release v0.98.1 ...harlan4096 — 11:37
Opera 129.0.5823.28
Hello! A new Op...harlan4096 — 11:36

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
No upcoming birthdays.

[-]
Online Staff
There are no staff members currently online.

>