Summary
Affected platforms
The following platforms are known to be affected:
Threat details
Once executed the malware connects to the configured command and control (C2) servers before requesting further instructions. The DNS servers used to resolve the C2 addresses are hard coded into the malware in order to resolve the non-standard .bit domains.
At present the following functionality has been observed:
- Dumping passwords and cookies from a variety of browsers
- Redirecting cryptocurrency to a configured wallet address
- Key logging
- Deploying Quasar remote access trojan
- Installing a remote desktop program
- Dumping Outlook passwords
- Creating a scheduled task for persistence
Remediation steps
| Type | Step |
|---|---|
|
To prevent and detect an infection, ensure that:
|
Last edited: 14 February 2020 2:42 pm