General

  • Target

    build.exe

  • Size

    1.6MB

  • Sample

    240428-rltlqshh4w

  • MD5

    03c0235c09b30b61f40fbb65d5bee883

  • SHA1

    31d971d0fc6293ad67a0c84ea88d0e7e15c4ce29

  • SHA256

    9a6b55d533c291f4b8706630f55663db1a11b2a1af3bf536b4a2abfa9761633e

  • SHA512

    454288409757bc72c4b66ab66de02cb3d8559c1fdabac032885752819560f2d4c968674aca85ffa6430addd5a9fbfa12cb80cf9f131dcefb09c343eddafff540

  • SSDEEP

    49152:DcTq24GjdGSiqkqXfd+/9AqYanieKdYX:D9EjdGSiqkqXf0FLYW

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1234145797856038953/Qx5Y46YXxYE_v9-5-5iTyAlkR-pe2Cn2DAdNinRgP7FgwC51wV8RMBhojwvQHc9imqqi

Targets

    • Target

      build.exe

    • Size

      1.6MB

    • MD5

      03c0235c09b30b61f40fbb65d5bee883

    • SHA1

      31d971d0fc6293ad67a0c84ea88d0e7e15c4ce29

    • SHA256

      9a6b55d533c291f4b8706630f55663db1a11b2a1af3bf536b4a2abfa9761633e

    • SHA512

      454288409757bc72c4b66ab66de02cb3d8559c1fdabac032885752819560f2d4c968674aca85ffa6430addd5a9fbfa12cb80cf9f131dcefb09c343eddafff540

    • SSDEEP

      49152:DcTq24GjdGSiqkqXfd+/9AqYanieKdYX:D9EjdGSiqkqXf0FLYW

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks