Today > | 2 High | 10 Medium | 3 Low vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
This analysis explores two distinct methods used to infect systems with AsyncRAT through open directories. The first technique involves a multi-stage process using various obfuscated scripts (VBS, BAT, PowerShell) and disguised files to download and execute the AsyncRAT payload. The second method e…