Cybaze-Yoroi ZLAB has taken a look at a recent Hawkeye malware attack. The malware authors behind Hawkeye have improved the malware service adding new capabilities and techniques. It can collect credentials from various applications, mostly email clients, web browser and FTP clients, and send them to the crooks via various protocols such as FTP, HTTP, and SMTP. The only solution to obtain more information about the infection mechanisms is to debug the program. The malware adopts the well known GetTickCount() anti-debug technique.”]
Source: https://securityaffairs.co/wordpress/88546/malware/anti-debugging-techniques-malware.html

