![]() A named pipe is used for communication between a server and clients. Malware uses this as a method of communication and to transfer information collected from the system (exfiltrate data). This object imports functions that allow the manipulation of named pipes.Determining what version and types of programs are installed on a device can easily be found from a file listing the malware creator could then attempt to find further vulnerabilities in the installed software. Malware uses this list to look for sensitive data or to find further points of attack. This object imports functions that are used to list files.Malware uses this to locate processes to inject into, imitate, or terminate. This object imports functions that can list all of the running processes on a system. ![]() Malware uses this to capture and save keystrokes to find sensitive information such as usernames and passwords.
0 Comments
Leave a Reply. |