Description
Keylogger and Infostealer first seen in November 2020.
DOC-S09989.exe
608KB
210121-6jnjmcggfx
30d51014bd7fcdf58947980ad56e12a9
9b372303fc82f98c27b28083bdc234a4dfeaa3b5
a46619353188d4f4391269c1e5b29ba8bc3bb0d476688f903af75dd2603f6e8d
9cdbcd72ae9386ed2783a260580ea1e40f3191239e16876fff3100263cc2d1b65796f2e56fc6d0543fc9b1a87b7f96f635978436796f36a2a996c0bb0c359d14
DOC-S09989.exe
30d51014bd7fcdf58947980ad56e12a9
608KB
9b372303fc82f98c27b28083bdc234a4dfeaa3b5
a46619353188d4f4391269c1e5b29ba8bc3bb0d476688f903af75dd2603f6e8d
9cdbcd72ae9386ed2783a260580ea1e40f3191239e16876fff3100263cc2d1b65796f2e56fc6d0543fc9b1a87b7f96f635978436796f36a2a996c0bb0c359d14
Keylogger and Infostealer first seen in November 2020.
Tries to access configuration files associated with programs like FileZilla.
Email clients store some user data on disk where infostealers will often target it.
Infostealers often target stored browser data, which can include saved credentials etc.
Uses a legitimate IP lookup service to find the infected system's external IP.
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.