General

  • Target

    message (4).txt

  • Size

    57KB

  • Sample

    240615-jeyccasdra

  • MD5

    5cee69780ae821f1ab193619ea6951ab

  • SHA1

    6c397eface79320a5920036c8e8f9c92342597be

  • SHA256

    938a55f060e9cf90c9a0aa9206f75ba032cc445e52415334982ccd70ad4e049a

  • SHA512

    8ba20a45ff56fee1ff5c46db6e3a4ebcadd31196b9afb5c5ee751ec4b31aa5eb285017eea64938c0572632c12fc04dc3be0d91c952676c261511845ab43c15a2

  • SSDEEP

    48:bt2swOCkPm0a1v6HbjHGOI65VvxQD0fPOPjtbPvP7d:prO0aJeW6vQQfGbZZ

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1251274140443217950/4tW-2TKY_GUglvlAcHZHgJ4i0Ao97DF8HwcPdiDHNSRX1dYDE154jwX8PWu_FX4mOOKM

Targets

    • Target

      message (4).txt

    • Size

      57KB

    • MD5

      5cee69780ae821f1ab193619ea6951ab

    • SHA1

      6c397eface79320a5920036c8e8f9c92342597be

    • SHA256

      938a55f060e9cf90c9a0aa9206f75ba032cc445e52415334982ccd70ad4e049a

    • SHA512

      8ba20a45ff56fee1ff5c46db6e3a4ebcadd31196b9afb5c5ee751ec4b31aa5eb285017eea64938c0572632c12fc04dc3be0d91c952676c261511845ab43c15a2

    • SSDEEP

      48:bt2swOCkPm0a1v6HbjHGOI65VvxQD0fPOPjtbPvP7d:prO0aJeW6vQQfGbZZ

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks