Last week, Bitdefender reported about a campaign where the first stage was a malicious 3ds Max encrypted script (.MSE) containing a malicious DLL ( https://www.bitdefender.com/files/News/CaseStudies/study/365/Bitdefender-PR-Whitepaper-APTHackers-creat4740-en-EN-GenericUse.pdf). #ESETresearch took a look at it. @mathieutartare 1/5
The .MSE script is encrypted using version:1 of the 3ds Max proprietary encryption algorithm. The malicious DLL embedded in the encrypted script is base64 encoded and loaded using 3ds Max .NET bindings. 2/5
We found hundreds of victims, predominantly located in South Korea 🇰🇷 and Japan 🇯🇵. Several of these victims are #videogame companies. The earliest sighting of this threat goes back to February 2020. 3/4
However, further analysis did not reveal any tool, code or infrastructure overlap between #Winnti and this campaign, we do not think they are related. #ESETresearch @mathieutartare 5/5
You can follow @ESETresearch.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled: