112
you are viewing a single comment's thread
view the rest of the comments
[-] TeamAssimilation@infosec.pub 9 points 2 days ago* (last edited 2 days ago)

I’d guess the former, given it’s tiny compared to normal droppers, but you can never be sure these days.

This sample is a multi-platform 'polyglot' binary acting as a dropper and potentially a browser-based exploit. It functions as a Windows PE (with no standard imports, suggesting custom shellcode or manual API resolution), a Linux shell script, and an HTML/JavaScript file. The Linux component contains a command ('tail -c+4294 $0 | lzma -dc > /tmp/a') that extracts and executes a hidden payload from its own body. The embedded JavaScript is obfuscated and uses 'eval' to execute dynamically generated code. This structure is typical of sophisticated malware or cross-platform exploit delivery kits.

this post was submitted on 12 Jan 2026
112 points (100.0% liked)

Programming

24410 readers
353 users here now

Welcome to the main community in programming.dev! Feel free to post anything relating to programming here!

Cross posting is strongly encouraged in the instance. If you feel your post or another person's post makes sense in another community cross post into it.

Hope you enjoy the instance!

Rules

Rules

  • Follow the programming.dev instance rules
  • Keep content related to programming in some way
  • If you're posting long videos try to add in some form of tldr for those who don't want to watch videos

Wormhole

Follow the wormhole through a path of communities !webdev@programming.dev



founded 2 years ago
MODERATORS