General

  • Target

    https://cdn.discordapp.com/attachments/850854604554895461/1232738168097476670/EXM_Premium_Tweaking_Utility_1.0_Cracked.bat?ex=662a8c62&is=66293ae2&hm=ee1933906354b793f8d037b3791b05c96c53cd962dc1ab0e3925ca64ad7c7a9e&

  • Sample

    240424-vkctdadf3z

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1230665115829796884/WMW-1Jk-Hqu0SkswEmKTSv0oGN1nbMyBu7JwdjWI9JXHVH0T_ZGXVl2riK6NVQ3tkLIN

Targets

    • Target

      https://cdn.discordapp.com/attachments/850854604554895461/1232738168097476670/EXM_Premium_Tweaking_Utility_1.0_Cracked.bat?ex=662a8c62&is=66293ae2&hm=ee1933906354b793f8d037b3791b05c96c53cd962dc1ab0e3925ca64ad7c7a9e&

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • UAC bypass

    • Modifies boot configuration data using bcdedit

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

1
T1562

Disable or Modify Tools

1
T1562.001

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Command and Control

Web Service

1
T1102

Impact

Inhibit System Recovery

1
T1490

Tasks