![]() ![]() Next, the malware will find out the details of the command and control server via com/ret.txt so that it can download and then encrypt files from an infected device. Reed warned: “Once the infection was triggered by the installer, the malware began spreading itself quite liberally around the hard drive.” The malware can also detect whether an infected device is using anti-malware applications from companies like Kaspersky and security apps such as Little Snitch, as per a report by Bleeping Computer. Like many recent malware strains, EvilQuest is even able to find out if it’s running on a virtual device or if debugging tools are running.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |