What is the difference between malware signatures and malware artifacts?

I am trying to analyse some malware samples but I am trying to understand the differen between malware signatures and malware artifacts. As far as I understand (and from what I’ve understood from this other post: What is the difference bet… Continue reading What is the difference between malware signatures and malware artifacts?

Malware dropper uses "^" character in syntax of cmd.exe before calling mshta.exe to download file?

I found a malicious Excel file that was using an embedded HTA program as its dropper to download a powershell program from a malicious IP. The dropper was on a hidden sheet in the file. After reviewing the output in the sandbox I found tha… Continue reading Malware dropper uses "^" character in syntax of cmd.exe before calling mshta.exe to download file?