Malicious AutoIT script delivered in a self-extracting RAR file, (Fri, Aug 25th)

Here is another sample that hit my curiosity. As usual, the infection vector was an email which delivered some HTML code in an attached file called "PO_5634_780.docx.html” (SHA1:d2158494e1b9e0bd85e56e431cbbbba465064f5a). It has a very low VT score (3/56)[1] and contains a simple escaped Javascript code:

Article Link: https://isc.sans.edu/diary/rss/22756