8/23/2023 0 Comments Mario. exeThe amassed details are then transmitted to a command-and-control (C2) server.Ī notable trait of the malware is that it uses the string "3rd_eye" to beacon its presence to the C2 server. The evolving stealer, like other malware families of its kind, is equipped to gather system metadata, including BIOS release date and vendor, total/free disk space on the C drive, currently running processes, register usernames, and volume information. ![]() The very first ThirdEye sample was uploaded to VirusTotal on April 4, 2023, with relatively fewer features. The arrival vector for the malware is presently unknown, although the nature of the lure points to it being used in a phishing campaign. A previously undocumented Windows-based information stealer called ThirdEye has been discovered in the wild with capabilities to harvest sensitive data from infected hosts.įortinet FortiGuard Labs, which made the discovery, said it found the malware in an executable that masqueraded as a PDF file with a Russian name "CMK Правила оформления больничных листов.pdf.exe," which translates to "CMK Rules for issuing sick ."
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |