
LimeRAT Malware Analysis: Extracting the Config
ANY.RUN researchers recently analyzed a LimeRAT sample and extracted its configuration. Check out their detailed breakdown of the decryption algorithm
The Hacker NewsNew post about #APT-C-36 #Hagga covering a detailed view of the infection of the last campaigns. From #NjRAT to #LimeRAT deployment.
https://lab52.io/blog/apt-c-36-from-njrat-to-apt-c-36/
APT-C-36: from NjRAT to LimeRAT
8-Year-Old VelvetSweatshop Bug Resurrected in LimeRAT Campaign
An old RAT learns an old trick.
Threatpost - English - Global - threatpost.com