Nowadays it’s very common for threats to use rootkit techniques to hide malicious files on computer hard drive, but it’s not so common to hide actual payload in the Windows Registry and use malicious file as only a loader. The following sample has evolved a bit since we first saw this kind of thing but […]
Latest Comments