PowerShell Keylogger
Sept. 4, 2024, 9:45 a.m.
Description
A newly identified keylogger operating via PowerShell script has been analyzed, revealing its capabilities to capture keystrokes, gather system information, and exfiltrate data. The malware uses a cloud server in Finland as a proxy and an Onion server for C2 communication, ensuring anonymity. It implements various functions including screen capture, encoded command execution, and persistent connection attempts. The keylogger's code suggests a French-speaking developer. While sophisticated in its approach, the persistence mechanism remains incomplete, indicating potential future enhancements. The analysis highlights the need for robust security measures against such stealthy threats.
Tags
Date
- Created: Sept. 4, 2024, 9:05 a.m.
- Published: Sept. 4, 2024, 9:05 a.m.
- Modified: Sept. 4, 2024, 9:45 a.m.
Indicators
- 181fe99c16fa6cc87a3161bc08a9e2dbd17531c7d713b09d8567c1b3debe121f
- 37.143.129.165
- opioem3zmp3bgx3qjqkh6vimkdoerrwh3uhawklm5ndv5e7k3t4edbqd.onion
Attack Patterns
- T1059.001
- T1571
- T1082
- T1083
- T1059
Additional Informations
- Finland