{"uuid": "449fddb3-e850-40e3-b7e8-ebb135170d93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-38028", "type": "published-proof-of-concept", "source": "https://t.me/vxunderground/4320", "content": "We've updated the vx-underground Malware Analysis paper collection\n\n- 2024-01-24 - Layers of Deception: Analyzing the Complex Stages of XLoader 4.3 Malware Evolution\n\n- 2024-02-19 - Pelmeni Wrapper: New Wrapper of Kazuar (Turla Backdoor)\n\n- 2024-03-26 - Comprehensive Analysis of EMOTET Malware: Part 1\n\n- 2024-04-13 - Analysis of malicious Microsoft office macros\n\n- 2024-04-22 - Analyzing Forest Blizzard\u2019s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials\n\n- 2024-04-29 - How to unpack Death Ransomware\n\n- 2024-05-01 - \u201cDirty stream\u201d attack: Discovering and mitigating a common vulnerability pattern in Android apps\n\n- 2024-05-08 - APT28 campaign targeting Polish government institutions", "creation_timestamp": "2024-06-07T15:28:26.000000Z"}