malware often gathers information about a system such as its physical specs, networking configuration, operating system name and version, process listings, or installed files. This information is sent back to the attacker, providing them with additional context on the systems they have compromised.
malware gathering system information
0001-01-01
Recent Posts
Linux Persistence: Startup Scripts
2024-11-10 DFIR CTF linux persistence systemd SysV init startup script
Linux Persistence: Cron
2024-11-10 DFIR CTF linux persistence cron