15Mar
Dissecting a NETWIRE Phishing Campaign’s Usage of Process Hollowing
Introduction
Malware authors attempt to evade detection by executing their
payload without having to write the executable file on the disk. One
of the most commonly seen techniques of this "fileless"
execution is code injection. Rather…