You must log in or # to comment.
At least the backdoor is open-source /s
Is there anything special about the “inside a RAR archive” part? Would other archive formats work just as well, or could the maliciously-named file be attached to an email directly?
I don’t see why the archive is important at all here, other than file naming limitations.
The weak point is from other automated scripts not sanitising the file list when such a file is present, not from the extraction of the archive.
I really am seeing a nothing burger here.
deleted by creator