January 8, 2021 By Pierluigi Paganini
Multiple threat actors have recently started using the Ezuri memory loader as a loader to executes malware directly into the victims’ memory.
According to researchers from AT&T’s Alien Labs, malware authors are choosing the Ezuri memory loader for their malicious codes.
The Ezuri memory loader tool allows to load and execute a payload directly into the memory of the infected machine, without writing any file to disk.