Deep Analysis of a QBot Campaign – Part II

In part two of the analysis of a recently discovered QBot campaign, discover how the core module collects data from a victim’s device, how it extracts submodules, how it injects its injection-module into other processes, and other malicious behaviors.<img src=”” height=”1″ width=”1″ alt=””/>

Read more