Weaponized RTF Document Generator & Mailer in PowerShell, (Fri, Apr 17th)

Read the original article: 
Weaponized RTF Document Generator & Mailer in PowerShell, (Fri, Apr 17th)


Another piece of malicious PowerShell script that I found while hunting. Like many malicious activities that occur in those days, it is related to the COVID19 pandemic. Its purpose of simple: It checks if Outlook is used by the victim and, if it's the case, it generates a malicious RTF document that is spread to all contacts extracted from Outlook. Let's have a look at it. The script is available on VT (SHA256: 1f7f0d75fe5dace66ec9b5935d28ba02765527f09f58345c2e33e17ab4c91bd7) and has a low score of 8/60[1].


Read the original article: 
Weaponized RTF Document Generator & Mailer in PowerShell, (Fri, Apr 17th)