Mason, a professional hacker, targets an organization and spreads Emotet malware through malicious script. After infecting the victim's device, Mason further used Emotet to spread the infection across local networks and beyond to compromise as many machines as possible. In this process, he used a tool, which is a self-extracting RAR file, to retrieve information related to network resources such as writable share drives.
What is the tool employed by Mason in the above scenario?
Conbon
2 weeks, 2 days agoinsaniunt
11 months agoVincent_Lu
1 year, 4 months agovictorfs
1 year, 6 months agosausageman
1 year, 7 months agoeli117
1 year, 7 months ago