Written by: Aaron Lee, Praveeth DSouza TL;DR Mandiant identified a new memory-only dropper using a complex, multi-stage infection process. This memory-only dropper decrypts and executes a PowerShell-based downloader. This PowerShell-based downloader is being tracked as PEAKLIGHT. Overview Mandiant Managed Defense identified a memory-only dropper and downloader delivering malware-as-a-service infostealers. During our investigation, Mandiant observed the malware download payloads such as LUMMAC.V2… Read More
PEAKLIGHT: Decoding the Stealthy Memory-Only Malware
- Uncategorized
- August 22, 2024
Stay Updated with Our Newsletter
Recent Posts
- Interview with Pryx Part 2: Diving Deeper into Server-Side Stealers & Other Interesting Chit-chats
- LockBit Developer Rostislav Panev Charged for Billions in Global Ransomware Damages
- Judge rules NSO Group is liable for spyware hacks targeting 1,400 WhatsApp user devices
- Nearly 6 million people were impacted by ransomware attack on Ascension Health
- LockBit Developer Rostislav Panev, a Dual Russian-Israeli Citizen, Arrested
Leave a Reply