In this article, we’ll explore a malicious loader known as PSLoramyra. This advanced malware leverages PowerShell, VBS, and BAT scripts to inject malicious payloads into a system, execute them directly in memory, and establish persistent access.
Classified as a fileless loader, PSLoramyra bypasses traditional detection methods by loading its primary payload entirely into memory, leaving minimal traces on the system.
PSLoramyra: Technical Analysis of Fileless Malware Loader
Submitted 3 weeks ago by Joker@sh.itjust.works to cybersecurity@infosec.pub
https://any.run/cybersecurity-blog/psloramyra-malware-technical-analysis/