Threat Research

    The blog post discusses how threat actors use Virtual Hard Disk (VHD) image files to deliver and distribute VenomRAT malware. The campaign begins with a phishing email that lures victims with a purchase order attachment. When extracted, the email contains a VHD file that mounts itself as a virtual drive....
    Creation of .conf files associated with VenomRAT, AsyncRAT, and Lummac samples observed in the wild....
    Looking for Something?
    Threat Research Categories:
    Tags