A backdoor espionage trojan known as Kazuar has API access that it can leverage to run commands on the systems it compromises. The malware, which is written in Microsoft’s .NET Framework and uses the ConfuserEX open source packer, initializes by gathering system and malware information and using those items to generate a mutex. It then […]… Read More
The post Kazuar’s API Access Lets Trojan Run Commands on Compromised Systems appeared first on The State of Security.
Source: Latest Security News – The State of Security @ May 4, 2017 at 06:17AM