Unit 42 researchers analyzed two real-world malware samples that integrate LLMs into their operation. The first is a .NET infostealer that calls OpenAI's GPT-3.5-Turbo API for evasion technique naming and C2 communication, but the AI integration is largely non-functional — technique names are logged but never executed, making
Table of contents
Executive SummaryAI Theater: A .NET Infostealer’s Illusory LLM FeaturesAI-Gated Execution: A Malware Dropper's LLM-Based Safety AssessmentConclusionIndicators of CompromiseSort: