New Fileless Malware Uses Windows Registry as Storage to Evade Detection

This article has been indexed from The Hacker News

A new JavaScript-based remote access Trojan (RAT) propagated via a social engineering campaign has been observed employing sneaky “fileless” techniques as part of its detection-evasion methods to elude discovery and analysis.
Dubbed DarkWatchman by researchers from Prevailion’s Adversarial Counterintelligence Team (PACT), the malware uses a resilient domain generation algorithm (DGA) to identify

Read the original article: New Fileless Malware Uses Windows Registry as Storage to Evade Detection