Description
Keylogger and Infostealer first seen in November 2020.
RFQSDCL1005C1N5STDFM01.doc
991KB
210122-djt5qlywqa
09d4af0b227dc3974954cc05f28bf8bc
473e5ddb68275afba681213c7293219f93c8a7d4
7fe770f2a75d693076b3f2c81baa8bf27ba82d84b287bb5df381cc214b95eb6b
8d1a0be85fb32f53975d9aabf4510690aa4561eb81aa558e2404211595ba7288bdb5798d8389d3c3fd77fe4ba7d65c999f3b92f01626a9e18d6d9d91ca976689
Protocol | smtp |
Host | mail.tavmachine.com |
Port | 587 |
Username | m.michy@tavmachine.com |
Password | G{y7.W#Ni!-A |
RFQSDCL1005C1N5STDFM01.doc
09d4af0b227dc3974954cc05f28bf8bc
991KB
473e5ddb68275afba681213c7293219f93c8a7d4
7fe770f2a75d693076b3f2c81baa8bf27ba82d84b287bb5df381cc214b95eb6b
8d1a0be85fb32f53975d9aabf4510690aa4561eb81aa558e2404211595ba7288bdb5798d8389d3c3fd77fe4ba7d65c999f3b92f01626a9e18d6d9d91ca976689
Keylogger and Infostealer first seen in November 2020.
Uses a legitimate IP lookup service to find the infected system's external IP.
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.