In-depth Analysis of A Recent Phishing Campaign Leveraging MALICIOUS_EXECUTION_SHELL Malware
Alex Morgan — Threat Intelligence Analyst Key TakeawaysThe attack vector utilized a phishing email with a malicious attachment that led to initial access.Our analysis uncovered that the malware employs multiple persistence mechanisms through Registry modifications.Command…