TLDR:
QWERTY Info Stealer, a new malware strain, employs advanced anti-debugging techniques to exfiltrate data from Windows systems. It was discovered on a web server hosted in Germany and utilizes various strategies to avoid detection. The malware collects system information, targets Internet Explorer data, and interacts with Command and Control servers to download additional payloads.
On a publicly indexed web server with the domain mailservicess[.]com, a new malware strain known as “QWERTY Info Stealer” has emerged targeting Windows systems with advanced anti-debugging techniques and data exfiltration capabilities. The malware employs multiple anti-debugging strategies to evade analysis and detection by security researchers and collects system information, targets Internet Explorer data, and interacts with Command and Control servers to download additional payloads for further execution.