"common forms of business emails. “ what makes these campaigns especially noteworthy is not just the malware itself, but the diversity of methods used to evade detection and abuse legitimate software and trusted system processes, ” said watchguard. dll sideloading and obfuscated j…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
71%
"but this time the malicious payload is hidden inside javascript and pdf files, which uses obfuscated code to help it hide from detection. when executed, the javascript drops two image files, which in turn drop powershell commands, obfuscated within long strings of code, which are…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.002Malicious File
70%
"but this time the malicious payload is hidden inside javascript and pdf files, which uses obfuscated code to help it hide from detection. when executed, the javascript drops two image files, which in turn drop powershell commands, obfuscated within long strings of code, which are…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.001Spearphishing Attachment
61%
"common forms of business emails. “ what makes these campaigns especially noteworthy is not just the malware itself, but the diversity of methods used to evade detection and abuse legitimate software and trusted system processes, ” said watchguard. dll sideloading and obfuscated j…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.002Malicious File
36%
"common forms of business emails. “ what makes these campaigns especially noteworthy is not just the malware itself, but the diversity of methods used to evade detection and abuse legitimate software and trusted system processes, ” said watchguard. dll sideloading and obfuscated j…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
34%
"formbook malware campaign uses multiple obfuscation techniques to avoid detection two phishing campaigns, each using a different stealthy infection technique, are targeting organizations in attacks which aim to deliver data stealing malware to devices running on microsoft windows…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1055.001Dynamic-link Library Injection
31%
"but this time the malicious payload is hidden inside javascript and pdf files, which uses obfuscated code to help it hide from detection. when executed, the javascript drops two image files, which in turn drop powershell commands, obfuscated within long strings of code, which are…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Formbook attacks use combination of DLL Side-Loading and Obfuscated JavaScript to stay hidden, researchers at WatchGuard have uncovered