The code then performs the following actions: The modified code performs various tasks before the application’s code is executed, including unpacking and decrypting shellcode. The code modification is hidden in CCleaner’s initialization code known as CRT (Common Runtime) that is usually inserted at compilation time. Vulnerability detailsĪ malicious modification of the 32-bit CCleaner.exe binary (CCleaner version and CCleaner Cloud version ) contains a two-stage backdoor that allows a remote attacker to execute code on an affected system. This could allow a remote attacker to extract sensitive data from the host, or execute malicious code on the host. CCleaner, a popular application used for performing routine maintenance on systems, was recently found to contain a malicious backdoor.
0 Comments
Leave a Reply. |