Win32.Ransom.BlueSky MVID-2022-0632 Code Execution

Discussion in 'News Aggregator' started by Packet Storm, 16 Aug 2022.

  1. Packet Storm

    Packet Storm Guest

    The BlueSky Win32.Ransom.BlueSky ransomware looks for and executes arbitrary DLLs in its current working directory. Therefore, we can hijack a DLL, execute our own code, and control and terminate the malware pre-encryption. The exploit DLL checks if the current directory is "C:\Windows\System32" and if not we grab our own process ID and terminate. All basic tests were conducted successfully in a virtual machine environment.

    Continue reading...
     

Share This Page

Loading...