Hallo zusammen, sofern nicht selber schon gesehen/-lesen hier [0] FYI "New UULoader Malware Distributes Gh0st RAT and Mimikatz in East Asia" --> "... UULoader's 'core' files are contained in a Microsoft Cabinet archive (.cab) file which contains two primary executables (an .exe and a .dll) which have had their file header stripped ..." --> siehe auch [1] VG Bernd [0] https://thehackernews.com/2024/08/new-uuloader-malware-distributes-gh0st.htm... [1] https://cyberint.com/blog/research/meet-uuloader-an-emerging-and-evasive-mal... -- Bernd Kohler IT Center Abteilung: Netze RWTH Aachen University Wendlingweg 10 52074 Aachen Tel: +49 241 80-29793 Fax: +49 241 80-22666 kohler@itc.rwth-aachen.de www.itc.rwth-aachen.de Social Media Kanäle des IT Centers: https://blog.rwth-aachen.de/itc/ https://www.facebook.com/itcenterrwth https://www.linkedin.com/company/itcenterrwth https://twitter.com/ITCenterRWTH https://www.youtube.com/channel/UCKKDJJukeRwO0LP-ac8x8rQ