Using WhatsApp for Malware Persistence


Here I demonstrate how a DLL Search Order Hijack bug in WhatsApp for Windows can be exploited by Malware to remain persistent. It's a little tongue-in-cheek, but showcases how to search for DLL insSearch Order Hijacks and also how commonly installed applications can be harnessed by bad-guys for malicious purposes.

If you want to find out more about DLL Search Order Hijacking you should definitely check out the following links:

Link to my slides:

How to compile your own DLLs using msfvenom:

Link to my PoC doc file:

Link to ProcMon Filter file

If you liked this video, please press "Like"
If you loved it, please Subscribe!

Also, if you want to chat malware / exploits / vulnerabilities then please follow me on

Thanks for watching!

Using WhatsApp for Malware Persistence Using WhatsApp for Malware Persistence Reviewed by Unknown on January 20, 2019 Rating: 5