Dropper

Fileless-Xec – Stealth Dropper Executing Remote Binaries Without Dropping Them On Disk

Certainly useful , mainly for fun, rougly inspired by 0x00 article Pentest use: fileless-xec is used on target machine to… Read More

2 years ago

GhostEmperor: From ProxyLogon to kernel mode

 Download GhostEmperor’s technical details (PDF) While investigating a recent rise of attacks against Exchange servers, we noticed a recurring cluster… Read More

3 years ago

Clast82: A Dropper That Delivers Two Banking Trojans

Check Point Research laid out details on financial trojans found embedded in at least ten Android-based apps by the same… Read More

3 years ago

Backdoor Shell Dropper Deploys CMS-Specific Malware

This kind of destructive dropper is tricky to detect due to the fact its target is not to directly execute… Read More

4 years ago