w
June 15, 2023, midnight | Peter Girnus

Trend Micro Simply Security www.rssmix.com

We looked into the documented behavior of SeroXen malware and noted the inclusion of the latest iteration of the batch obfuscation engine BatCloak to generate a fully undetectable (FUD) .bat loader. This is the second part of a three-part series documenting the abuse of BatCloak’s evasion capabilities and interoperability with other malware.

abuse bat batch batcloak capabilities engine evasion fud inclusion interoperability latest loader malware obfuscation reports series seroxen trend micro research : articles trend micro research : cyber threats trend micro research : endpoints trend micro research : iot trend micro research : malware trend micro research : phishing trend micro research : privacy & risks trend micro research : spam undetectable

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States