General

  • Target

    253MzWzDFZpiHVY2S4PKfM-1200-80.jpg

  • Size

    142KB

  • Sample

    240602-kzyz2shd58

  • MD5

    4883cfb1d590ba853c55b43630ef8f0b

  • SHA1

    836b45a3b18e05755f259fe476301aa9e71c9684

  • SHA256

    d53b61c198eca2409f7f8f731e8d0e1a09e084a9a4a889c617c7ea7718d153b8

  • SHA512

    d7513c248d9ebb8f7bf4870cb6a679b9e9d68af61e044cd5d85147eba9ec91d4f776ef00c7f259009bc4eb5cf006b46f8a56171561b21dccda879680db078c5c

  • SSDEEP

    3072:mLumzujtsrso0xtuSpB42hCpZwtbAUYhiiv0Xuum3s:mimatsrso0xtZpB4JpGtbSsicXuXs

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1246744609506201672/hf0mn5sfqMQPf6SMyKIYJ8eZeUJB29FUHxPVgoINxglDNVOq7piJX5Um26b_zeWmSzu8

Targets

    • Target

      253MzWzDFZpiHVY2S4PKfM-1200-80.jpg

    • Size

      142KB

    • MD5

      4883cfb1d590ba853c55b43630ef8f0b

    • SHA1

      836b45a3b18e05755f259fe476301aa9e71c9684

    • SHA256

      d53b61c198eca2409f7f8f731e8d0e1a09e084a9a4a889c617c7ea7718d153b8

    • SHA512

      d7513c248d9ebb8f7bf4870cb6a679b9e9d68af61e044cd5d85147eba9ec91d4f776ef00c7f259009bc4eb5cf006b46f8a56171561b21dccda879680db078c5c

    • SSDEEP

      3072:mLumzujtsrso0xtuSpB42hCpZwtbAUYhiiv0Xuum3s:mimatsrso0xtZpB4JpGtbSsicXuXs

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Collection

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks