We discovered JScript/VBScript codes within several samples of malicious *.msi files. Malicious actors can abuse custom actions in these files to execute malicious scripts and drop malware that are either capable of initiating a system shutdown or targeting financial systems located in certain locations. We recently discovered malicious MSI files that download and execute other files and could bypass traditional security solutions. Every package file has a relational-type database that contains instructions and data required to install or remove programs. Windows Installer uses Microsoft Software Installation (MSI) package files to install programs. PDT to amend technical analysis on Avira-related files and include latest statement from Avira
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |