Mason, a professional hacker, targets an organization and spreads Emotet malware through malicious script. After infecting the victim's device, Mason further used Emotet to spread the infection across local networks and beyond to compromise as many machines as possible. In this process, he used a tool, which is a self-extracting RAR file, to retrieve information related to network resources such as writable share drives.
What is the tool employed by Mason in the above scenario?
Scryptic
Highly Voted 2 years, 2 months agomileke2
Highly Voted 1 year, 7 months agodinonino
1 year, 3 months agovictorfs
Most Recent 7 months, 1 week agoHadiCyA
7 months, 3 weeks ago