PSLoramyra: Technical Analysis of Fileless Malware Loader
(any.run)
from Joker@sh.itjust.works to cybersecurity@infosec.pub on 27 Nov 11:27
https://sh.itjust.works/post/28688615
from Joker@sh.itjust.works to cybersecurity@infosec.pub on 27 Nov 11:27
https://sh.itjust.works/post/28688615
In this article, we’ll explore a malicious loader known as PSLoramyra. This advanced malware leverages PowerShell, VBS, and BAT scripts to inject malicious payloads into a system, execute them directly in memory, and establish persistent access.
Classified as a fileless loader, PSLoramyra bypasses traditional detection methods by loading its primary payload entirely into memory, leaving minimal traces on the system.
threaded - newest