Outlaw cybergang attacking targets worldwide
SecureList
APRIL 29, 2025
Processes checks performed by the threat After the process checks and killing are done, the b / run file is executed, which is responsible for maintaining persistence on the infected machine and executing next-stage malware from its code. Tactics, techniques and procedures Below are the Outlaw TTPs identified from our malware analysis.
Let's personalize your content