LimeRAT Malware Analysis: Extracting the Config

ANY.RUN researchers recently analyzed a LimeRAT sample and extracted its configuration. Check out their detailed breakdown of the decryption algorithm

The Hacker News

New post about #APT-C-36 #Hagga covering a detailed view of the infection of the last campaigns. From #NjRAT to #LimeRAT deployment.

https://lab52.io/blog/apt-c-36-from-njrat-to-apt-c-36/

APT-C-36: from NjRAT to LimeRAT

8-Year-Old VelvetSweatshop Bug Resurrected in LimeRAT Campaign

An old RAT learns an old trick.

Threatpost - English - Global - threatpost.com