URL has been copied successfully!
Unmasking KorPlug Malware: TTPs, Control Flow, and Exposed IOCs
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Unmasking KorPlug Malware: TTPs, Control Flow, and Exposed IOCs

As part of the ongoing analysis of the KorPlug malware family, this second installment focuses on the complex second-stage payload, expanding on earlier discoveries of DLL side-loading methods that use legitimate programs to execute code initially. The payload, a malicious DLL with SHA-256 hash b6b239fe0974cf09fe8ee9bc5d0502174836a79c53adccdbb1adeb1f15c6845c, measures 638,976 bytes (624 KB) and is structured as an […] The post Unmasking KorPlug Malware: TTPs, Control Flow, and Exposed IOCs appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

First seen on gbhackers.com

Jump to article: gbhackers.com/unmasking-korplug-malware/

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link