PSLoramyra: Technical Analysis of Fileless Malware Loader (any.run)
from Joker@sh.itjust.works to cybersecurity@infosec.pub on 27 Nov 11:27
https://sh.itjust.works/post/28688615

In this article, we’ll explore a malicious loader known as PSLoramyra. This advanced malware leverages PowerShell, VBS, and BAT scripts to inject malicious payloads into a system, execute them directly in memory, and establish persistent access.

Classified as a fileless loader, PSLoramyra bypasses traditional detection methods by loading its primary payload entirely into memory, leaving minimal traces on the system.

#cybersecurity

threaded - newest