CPU, and screen resolution and stores it in “User Information.txt”, subsequently appending this file to a zip archive held in memory (Figure 17). Furthermore, the malware harvests credentials and sensitive files from various applications. For FileZilla, the malware searches for the XML file lo...
Initial Access T1566.002 - Phishing: Spearphishing Link Victim downloads malicious zip archive Execution T1204.002 - User Execution: Malicious File Victim executes Internet Shortcut (.URL) file that exploits CVE-2024-38112 Defense Evasion T1218 - System Binary ...
CPU, and screen resolution and stores it in “User Information.txt”, subsequently appending this file to a zip archive held in memory (Figure 17). Furthermore, the malware harvests credentials and sensitive files from various applications. For FileZilla, th...