Now Reading
Fileless Malware Overview

Fileless Malware Overview

by Igor Mikhaylov2017-09-27

Malicious hackers use malicious fileware to achieve stealth, escalate privileges, collect confidential information and achieve perseverance in the system, so malware infection can continue to affect a longer period of time.


In this article, BALAJI N explores how this works after loading n1n3. It describes in detail the structure of n1n3.exe, as well as the functions that the script n1n3 shows. The n1n3.exe structure is a small malicious artifact of size 182kb in a binary file.

More information can be found in this article.

Leave a Response

Please enter the result of the calculation above.