Today > 5 Critical | 6 High | 28 Medium vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
The analysis delves into the Mekotio Trojan, a sophisticated malware that employs a PowerShell dropper to execute its payload. The dropper employs obfuscation techniques, such as custom XOR decryption, to conceal its operations. It collects system information, communicates with a command-and-contro…