Skip to main content

Table 4 The Evolution of Poweliks

From: An emerging threat Fileless malware: a survey and research challenges

Functionality/ Attack VectorWowliksPoweliks
Infection methodFile-basedIn memory
Configuration dataOn-diskIn memory
Injection dataDLL file on diskRegistry
Persistence methodDLL file on diskRegistry