Description
Keylogger and Infostealer first seen in November 2020.
IMG_9501.EXE
1MB
210122-q7gdfp8qcx
e3d9793d14ec64e2398c709a3483c212
6a86e4ecd6529345e29fb461b59787a7560f4865
14dc0be4a9f52bb8c9614621b4d521ed56592dcde2483b6ff099d061bcb7cada
f3c0a8818fcc5bb09bd76fad45d49bb7af155e5c77bb58aac66323efb71c0a4853813c3ef964694e1b8df3e325a0602ec683f478a575616947a7624b8406128f
IMG_9501.EXE
e3d9793d14ec64e2398c709a3483c212
1MB
6a86e4ecd6529345e29fb461b59787a7560f4865
14dc0be4a9f52bb8c9614621b4d521ed56592dcde2483b6ff099d061bcb7cada
f3c0a8818fcc5bb09bd76fad45d49bb7af155e5c77bb58aac66323efb71c0a4853813c3ef964694e1b8df3e325a0602ec683f478a575616947a7624b8406128f
Keylogger and Infostealer first seen in November 2020.
Email clients store some user data on disk where infostealers will often target it.
Infostealers often target stored browser data, which can include saved credentials etc.
Uses a legitimate IP lookup service to find the infected system's external IP.
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.