How Cracks and Installers Bring Malware to Your Device

Trend Micro research shows how attackers use platforms like YouTube to spread fake installers via trusted hosting services, employing encryption to evade detection and steal sensitive browser data. Author: AlienVault

Related Tags:
hashes

domains

ioc

revil

cyber threats

c2 servers

MARSSTEALER

RUGMI

Sodinokibi

Associated Indicators:
D4DF1ABA83289161D578336E1B7B6DAF7269BB73ACC92BD9DFA2C262EBC6C4D2

27055280296D10B811B4D76456DBC5D29AAC8B4FC33708FA47B36334E1D85700

A9EA40670A686E175CC8C32E3FC6BA92505379303D6524F149022490A2DDA181

9136C32467CD79E8FDB7EA154540093C005C6CF636BC52D7AF6CAF170A1A828B

24EFBB21F68A0DE095014DAEB300879DF8428847A1E9586B8E62A54E4E548D99

D639E613F76EBE5B3AC06D637A0BD5FE92BE175C243B754F01C82C185CC282D0

C74BF29A2D3B5C38F824EB82A5C0FDE0448D7194C36250E5B2B8EC9663B27526

C35431B8DB327238A32CE86F4F65B57571A57CE552D79E05CD49B53D4DC66F97

2AF2EE421AE26A98F9775BFE46821FFB47B406D3