home.social

#autoit — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #autoit, aggregated by home.social.

  1. Unmasking a Multi-Stage Loader: AutoIt Abuse Leading to Vidar Stealer Command-and-Control Communication

    Pulse ID: 6a02ae6f8736a6b944d7d662
    Pulse Link: otx.alienvault.com/pulse/6a02a
    Pulse Author: Tr1sa111
    Created: 2026-05-12 04:37:03

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Autoit #CyberSecurity #InfoSec #OTX #OpenThreatExchange #Vidar #bot #Tr1sa111

  2. Unmasking a Multi-Stage Loader: AutoIt Abuse Leading to Vidar Stealer Command-and-Control Communication

    A sophisticated multi-stage infection chain was identified through proactive threat hunting, beginning with the execution of MicrosoftToolkit.exe, a commonly abused hack tool. The attack employed file masquerading techniques, renaming a .dot file to .bat format to evade detection. The malware performed process discovery and attempted to terminate security-related processes before extracting payloads using extract32.exe. An AutoIt-compiled executable (Replies.scr) functioned as a loader, processing an external encrypted payload file and establishing command-and-control communication with infrastructure associated with Vidar Stealer. The malware demonstrated advanced anti-analysis capabilities, including debugger detection and instrumentation callback queries. It targeted credentials, browser data, cryptocurrency wallets, and system information. Post-execution cleanup routines deleted artifacts and terminated processes to minimize forensic evidence and evade detection, significantly complicating incident res...

    Pulse ID: 6a01c2382e61b490cfa457e4
    Pulse Link: otx.alienvault.com/pulse/6a01c
    Pulse Author: AlienVault
    Created: 2026-05-11 11:49:12

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Autoit #Browser #CyberSecurity #InfoSec #Malware #Microsoft #Nim #OTX #OpenThreatExchange #RAT #Vidar #bot #cryptocurrency #AlienVault

  3. Мой соавтор — DeepSeek

    Эта статья о моем опыте сотрудничества с DeepSeek в разработке некоторых поделок на различных языках программирования.Раньше писал на этих языках, но без помощи ИИ.

    habr.com/ru/articles/1010138/

    #искусственный_интеллект #autoit #lua # #gsm

  4. Мой соавтор — DeepSeek Эта статья о моем опыте сотрудничества с DeepSeek в разработке некоторых поделок на различн...

    #искусственный #интеллект #autoit #lua #cи #gsm

    Origin | Interest | Match