this post was submitted on 27 Nov 2024
2 points (100.0% liked)

cybersecurity

3301 readers
36 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 1 year ago
MODERATORS
 

In this article, we’ll explore a malicious loader known as PSLoramyra. This advanced malware leverages PowerShell, VBS, and BAT scripts to inject malicious payloads into a system, execute them directly in memory, and establish persistent access.

Classified as a fileless loader, PSLoramyra bypasses traditional detection methods by loading its primary payload entirely into memory, leaving minimal traces on the system.

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here