Deep Analysis of a QBot Campaign – Part II


In part two of the analysis of a recently discovered QBot campaign, discover how the core module collects data from a victim’s device, how it extracts submodules, how it injects its injection-module into other processes, and other malicious behaviors.<img src=”http://feeds.feedburner.com/~r/fortinet/blog/threat-research/~4/wIJv_SIUe0k” height=”1″ width=”1″ alt=””/>

Read more