Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

Beyond good ol’ Run key, Part 29

$
0
0
LNK files are used by malware for many years so there is not much new about it that can be said with regards to persistence.

Examples include:

Placing shortcut files in popular locations (Desktop, Start Menu)
Replacing an .exe path inside the .lnk files with one pointing to a malicious executable (‘man-in-the-middle’, or a variant of a companion virus)
Exploits (as used by Stuxnet)
Etc.
The following examples explore 2 more (but less popular) methods of leveraging LNK files as a persistence mechanism here........http://www.hexacorn.com/blog/2015/03/13/beyond-good-ol-run-key-part-29/

Viewing all articles
Browse latest Browse all 8064

Trending Articles