Overview
overview
3Static
static
1cstealer-main.zip
windows7-x64
1cstealer-main.zip
windows10-2004-x64
1cstealer-main/LICENSE
windows7-x64
1cstealer-main/LICENSE
windows10-2004-x64
1cstealer-m...DME.md
windows7-x64
3cstealer-m...DME.md
windows10-2004-x64
3cstealer-m...der.py
windows7-x64
3cstealer-m...der.py
windows10-2004-x64
3cstealer-m...s1.png
windows7-x64
3cstealer-m...s1.png
windows10-2004-x64
3cstealer-m...s2.png
windows7-x64
3cstealer-m...s2.png
windows10-2004-x64
3cstealer-m...s3.png
windows7-x64
3cstealer-m...s3.png
windows10-2004-x64
3cstealer-m...s4.png
windows7-x64
3cstealer-m...s4.png
windows10-2004-x64
3cstealer-m...ll.bat
windows7-x64
1cstealer-m...ll.bat
windows10-2004-x64
1cstealer-main/main.py
windows7-x64
3cstealer-main/main.py
windows10-2004-x64
3cstealer-m...ts.txt
windows7-x64
1cstealer-m...ts.txt
windows10-2004-x64
1cstealer-m...rt.bat
windows7-x64
1cstealer-m...rt.bat
windows10-2004-x64
1Analysis
-
max time kernel
299s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
27-06-2023 13:38
Static task
static1
Behavioral task
behavioral1
Sample
cstealer-main.zip
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
cstealer-main.zip
Resource
win10v2004-20230621-en
Behavioral task
behavioral3
Sample
cstealer-main/LICENSE
Resource
win7-20230621-en
Behavioral task
behavioral4
Sample
cstealer-main/LICENSE
Resource
win10v2004-20230621-en
Behavioral task
behavioral5
Sample
cstealer-main/README.md
Resource
win7-20230621-en
Behavioral task
behavioral6
Sample
cstealer-main/README.md
Resource
win10v2004-20230621-en
Behavioral task
behavioral7
Sample
cstealer-main/builder.py
Resource
win7-20230621-en
Behavioral task
behavioral8
Sample
cstealer-main/builder.py
Resource
win10v2004-20230621-en
Behavioral task
behavioral9
Sample
cstealer-main/img/ss1.png
Resource
win7-20230621-en
Behavioral task
behavioral10
Sample
cstealer-main/img/ss1.png
Resource
win10v2004-20230621-en
Behavioral task
behavioral11
Sample
cstealer-main/img/ss2.png
Resource
win7-20230621-en
Behavioral task
behavioral12
Sample
cstealer-main/img/ss2.png
Resource
win10v2004-20230621-en
Behavioral task
behavioral13
Sample
cstealer-main/img/ss3.png
Resource
win7-20230621-en
Behavioral task
behavioral14
Sample
cstealer-main/img/ss3.png
Resource
win10v2004-20230621-en
Behavioral task
behavioral15
Sample
cstealer-main/img/ss4.png
Resource
win7-20230621-en
Behavioral task
behavioral16
Sample
cstealer-main/img/ss4.png
Resource
win10v2004-20230621-en
Behavioral task
behavioral17
Sample
cstealer-main/install.bat
Resource
win7-20230621-en
Behavioral task
behavioral18
Sample
cstealer-main/install.bat
Resource
win10v2004-20230621-en
Behavioral task
behavioral19
Sample
cstealer-main/main.py
Resource
win7-20230621-en
Behavioral task
behavioral20
Sample
cstealer-main/main.py
Resource
win10v2004-20230621-en
Behavioral task
behavioral21
Sample
cstealer-main/requirements.txt
Resource
win7-20230621-en
Behavioral task
behavioral22
Sample
cstealer-main/requirements.txt
Resource
win10v2004-20230621-en
Behavioral task
behavioral23
Sample
cstealer-main/start.bat
Resource
win7-20230621-en
Behavioral task
behavioral24
Sample
cstealer-main/start.bat
Resource
win10v2004-20230621-en
General
-
Target
cstealer-main/README.md
-
Size
5KB
-
MD5
4c3d65af4c3a541b8260bdbcfb2e4246
-
SHA1
6b6df676fd2add7d0fa0ce4b04ef07c275bad687
-
SHA256
62e47e1c0a289846bdc1f907c4fd74963d2ec655d3002eeb71f58a26d8568bea
-
SHA512
8f4188b7ece197663f7bd148e03b94746bb1b202e7555fa2ccf3b65a0f172be024c5ee83f56a7efbdd19bbf10efc04c117260bf4b03d11b54ca06ee4ad2d671d
-
SSDEEP
96:UIL6rU6RImEUttIGI21IHVAH7ndJFK5RSQgbWI4WIbWIBQWI4JE+BWm7GwUhgZ:UXrUED17wVAH7vMMna9jQAxqM
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3419557010-3639509551-242374962-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419557010-3639509551-242374962-1000_CLASSES\md_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3419557010-3639509551-242374962-1000_CLASSES\.md rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3419557010-3639509551-242374962-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3419557010-3639509551-242374962-1000_CLASSES\md_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3419557010-3639509551-242374962-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3419557010-3639509551-242374962-1000_CLASSES\md_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419557010-3639509551-242374962-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3419557010-3639509551-242374962-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3419557010-3639509551-242374962-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1508 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1492 1760 cmd.exe 29 PID 1760 wrote to memory of 1492 1760 cmd.exe 29 PID 1760 wrote to memory of 1492 1760 cmd.exe 29 PID 1492 wrote to memory of 1508 1492 rundll32.exe 30 PID 1492 wrote to memory of 1508 1492 rundll32.exe 30 PID 1492 wrote to memory of 1508 1492 rundll32.exe 30 PID 1492 wrote to memory of 1508 1492 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\cstealer-main\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\cstealer-main\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\cstealer-main\README.md"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1508
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f6263cc35b8f37d927fc96a04ff1c1d2
SHA13e00693dcd34e24189fb3f09288050a9e3c49a16
SHA25646e81a2e4036a9ea995df117a88583582f5e070a6bd594c0e7f8977cbe305380
SHA51261a4a341674f6f551f53faa8c7a8064ff81735e58f087e4f6a343097407d566609f654e4b27dcb0109c1c3a8c24741246fd5876bee315d15cde4421d94819613