Now Reading
Fileless Malware Overview

Fileless Malware Overview

Malicious hackers use malicious fileware to achieve stealth, escalate privileges, collect confidential information and achieve perseverance in the system, so malware infection can continue to affect a longer period of time.


In this article, BALAJI N explores how this works after loading n1n3. It describes in detail the structure of n1n3.exe, as well as the functions that the script n1n3 shows. The n1n3.exe structure is a small malicious artifact of size 182kb in a binary file.

More information can be found in this article.

Leave a Response