Posted by Stefan Kanthak on Dec 22
Hi @ll,
the executable installer [°][‘] (rather: the 7-Zip based executable
self-extractor [²]) of Rapid7’s (better known for their flagship
Metasploit) ScanNowUPnP.exe loads and executes several rogue/bogus
DLLs eventually found in the directory it is started from (the
“application directory”), commonly known as “DLL hijacking”.
For software downloaded with a web browser the application directory
is typically…