General

  • Target

    763522f54f492b03155678b83867905bab303416687f2bf033ba1777ad4bee56

  • Size

    1.6MB

  • Sample

    240619-3cmbva1cqm

  • MD5

    1c8b5449797e783cc813de7ffb513a16

  • SHA1

    f7e8c8771d8fb9215a437d976b1b396da91f3ca0

  • SHA256

    763522f54f492b03155678b83867905bab303416687f2bf033ba1777ad4bee56

  • SHA512

    e0ac905cc4858b022d19fc7d62f91176aa780192736bcf429f6959612b5f2caf8a6406f1b91f439ee764d8ec1c5c374adf957e3dbd7cc08813cbdaaac65cac0b

  • SSDEEP

    49152:tcTq24GjdGSiqkqXfd+/9AqYanieKdYn:t9EjdGSiqkqXf0FLYW

Score
10/10

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1252102291188613131/eoXexq_iB2mAips17wpkBRQC47YyP3Z4SlaWz4dm8JxfDNXA6a3jBy_wWvQkndzEX1th

Targets

    • Target

      763522f54f492b03155678b83867905bab303416687f2bf033ba1777ad4bee56

    • Size

      1.6MB

    • MD5

      1c8b5449797e783cc813de7ffb513a16

    • SHA1

      f7e8c8771d8fb9215a437d976b1b396da91f3ca0

    • SHA256

      763522f54f492b03155678b83867905bab303416687f2bf033ba1777ad4bee56

    • SHA512

      e0ac905cc4858b022d19fc7d62f91176aa780192736bcf429f6959612b5f2caf8a6406f1b91f439ee764d8ec1c5c374adf957e3dbd7cc08813cbdaaac65cac0b

    • SSDEEP

      49152:tcTq24GjdGSiqkqXfd+/9AqYanieKdYn:t9EjdGSiqkqXf0FLYW

    Score
    10/10
    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.

    • Detects executables manipulated with Fody

    • Detects executables referencing Discord tokens regular expressions

    • Detects executables referencing credit card regular expressions

    • Detects executables referencing many VPN software clients. Observed in infosteslers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Detects executables referencing many email and collaboration clients. Observed in information stealers

    • Detects executables with interest in wireless interface using netsh

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks