Download File — 22270d922398778df01da9e0be5f22ad1...
Information stealing, network propagation, and harvesting banking credentials.
Immediately disconnect the affected machine from the network to prevent lateral movement. Download File 22270D922398778DF01DA9E0BE5F22AD1...
Upon execution, the file attempts to communicate with hardcoded C2 IP addresses. It uses custom encryption over HTTPS (typically ports 443 or 449) to send stolen data and receive new instructions. It may also perform "IP checking" by connecting to legitimate services like ident.me to verify the infected machine's external IP address. Download File 22270D922398778DF01DA9E0BE5F22AD1...
Ensure all systems are patched against SMB vulnerabilities to prevent the "worm" modules from spreading. Download File 22270D922398778DF01DA9E0BE5F22AD1...