Skip to main content

Table 4 The Evolution of Poweliks

From: An emerging threat Fileless malware: a survey and research challenges

Functionality/ Attack Vector

Wowliks

Poweliks

Infection method

File-based

In memory

Configuration data

On-disk

In memory

Injection data

DLL file on disk

Registry

Persistence method

DLL file on disk

Registry