While checking the files extracted from the "HDP" Remote Desktop HoneyPots used by my AI "Threat Feed Service", I realize that in addition to the "usual samples" there is a large amount of ".js" files identified with the arbitrary signature "Unknown_Dropper" and a child "Dropped", at which I decide to go into the analysis to understand the real nature of this new malware....
info@threatfeedservice.it