The article examines three unusual malware samples: a C++/CLI IIS backdoor enabling stealthy remote command execution, a bootkit leveraging the GRUB 2 bootloader to gain early system control and persistence, and a cross-platform post-exploitation framework developed in C++. These cases highlight evolving attacker techniques that prioritize stealth, persistence, and unconventional execution methods to evade detection. Author: AlienVault
Related Tags:
T1574.005
T1542.003
T1505.003
APT
T1106
backdoor
T1027
AlienVault OTX
AlienVault
Associated Indicators:
8571A354B5CDD9EC3735B84FA207E72C7AEA1AB82EA2E4FFEA1373335B3E88F4
C073BF423A08093A112DB2C4D7C7D78C61341D2D
38EFA1C72DF70A28A19657A2297B97A842CD59FC
066AFA6F37C4CFA16AD8FEE3E37CCA46
F403A21B0D3147ECF76CB5797472960A


