Discussion in 'malware problems & news' started by SweX, Apr 10, 2013.
Hmm. There's a great deal there about the complex techniques the dropper uses, but they don't actually say what the dropper itself consists of, and how it is launched.
Also, what's with the .lz extension? How many Windows users would ever have heard of an LZMA compressed archive?
Edit: sigh, samples are no longer available. Can anyone tell me what the dropper's mode of action is?
Separate names with a comma.