The article talks about droppers and loaders. The malware could be some binary 
catted to a txt file then encrypted and hidden in something else which gets 
unpacked by the dropper, or it might be downloaded at a later stage from 
elsewhere. The nim code could be delivered uncompiled and the user is tricked 
into building it after downloading it, then that installs the real malware. 
That sort of thing is about misdirection and doing things in unusual ways that 
haven't been done before, so a lesser known language is ideal to make an 
innocent looking "installer" app.

Reply via email to