Abusing Remote Administration Tools
The bad, worse and the horrible by Gunnar Guðmundsson and Axel Marinho Guðmundsson Introduction In this article, we look at a malware payload from an exploited Microsoft Word document. With a little Python scripting and deciphering we research a single sample and gather a few more versions to view a