Lazarus used ‘KANDYKORN’ malware in attempt to compromise exchange —Elastic
Elastic has actually named the brand-new malware “KANDYKORN” and the loader program that loads it into memory “SUGARLOAD,” as the loader file has an unique “. This file was obfuscated using a “binary packer,” Elastic stated, allowing it to bypass most malware detection programs. According to Elastic, they ran VirusTotal malware detection on SUGARLOADER, and the detector declared that the file was not malicious.Related: Crypto firms are careful: Lazarus brand-new malware can now bypass detectionOnce SUGARLOADER was downloaded into the computer system, it connected to a remote server and downloaded KANDYKORN directly into the devices memory.
Thank you for reading this post, don't forget to subscribe!
Elastic has named the new malware “KANDYKORN” and the loader program that loads it into memory “SUGARLOAD,” as the loader file has a novel “. This file was obfuscated utilizing a “binary packer,” Elastic stated, allowing it to bypass most malware detection programs. According to Elastic, they ran VirusTotal malware detection on SUGARLOADER, and the detector declared that the file was not malicious.Related: Crypto companies beware: Lazarus new malware can now bypass detectionOnce SUGARLOADER was downloaded into the computer system, it connected to a remote server and downloaded KANDYKORN directly into the gadgets memory.
Related Content
- Person set themselves on fire outside Supreme Court Building, officials say
- CleanSpark Breaks Ground On 50 Megawatt Bitcoin Mining Expansion
- 3 reasons why Ether price is still pinned below $1,900
- Bitcoin is evolving into a multi-asset network
- Bitcoin ‘short squeeze’ sends BTC price to $35.9K as OI stays elevated