The new Coyote trojan variant attack uses a LNK file to execute a PowerShell command, which helps retrieve a PowerShell script for launching the trojan. This trojan obtains system details and an antivirus product list while attempting to bypass sandbox discovery, says a Fortinet FortiGuard Labs study.

China-Linked Hackers Deploy New TencShell Malware Against Global Manufacturer – Infosecurity Magazine
China-Linked Hackers Deploy New TencShell Malware Against Global Manufacturer Infosecurity Magazine


