General

  • Target

    genarox_v4.3.exe

  • Size

    1.6MB

  • Sample

    240722-ph8v5sybkj

  • MD5

    dafe9169b9ec4a66588ba0d537ce3d42

  • SHA1

    0af4ecc4c7e270da62f3df998a9c27e0891cf447

  • SHA256

    646cc3b5013d0ef04f0815f8cffb07e0e689dae7266a277ccfaba9db2b4a9cfa

  • SHA512

    c6a1ce5be543f062e155e99ec9c4fcc31212098ed14136184a5db8b18c515e9376d01f0772241f92024001347392dafc8d5d1c5bdba93591182462eb1cd2a222

  • SSDEEP

    49152:bkTq24GjdGSiqkqXfd+/9AqYanieKdsI:b1EjdGSiqkqXf0FLYW

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1264918620270628864/0Wx1g6ecGtTZ0K_cV2trxxLmx3GVzX-TLRRbWYurZW2Jk3RZ4gTMQGcU6iLX2eUqayUO

Targets

    • Target

      genarox_v4.3.exe

    • Size

      1.6MB

    • MD5

      dafe9169b9ec4a66588ba0d537ce3d42

    • SHA1

      0af4ecc4c7e270da62f3df998a9c27e0891cf447

    • SHA256

      646cc3b5013d0ef04f0815f8cffb07e0e689dae7266a277ccfaba9db2b4a9cfa

    • SHA512

      c6a1ce5be543f062e155e99ec9c4fcc31212098ed14136184a5db8b18c515e9376d01f0772241f92024001347392dafc8d5d1c5bdba93591182462eb1cd2a222

    • SSDEEP

      49152:bkTq24GjdGSiqkqXfd+/9AqYanieKdsI:b1EjdGSiqkqXf0FLYW

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Privilege Escalation

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks