Trojan.Ransom.Ryuk.A MVID-2022-0640...

- AV AC AU C I A
发布: 2022-09-20
修订: 2024-10-05

Trojan.Ransom.Ryuk.A ransomware looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a DLL, execute our own code, and control and terminate the malware pre-encryption. Once loaded the exploit dll will check if the current directory is "C:\Windows\System32" and if not, we grab our process ID and terminate. All basic tests were conducted successfully in a virtual machine environment.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息