General

  • Target

    StumbleMoon_Launcher.exe

  • Size

    1.6MB

  • Sample

    240723-lbcycaybrh

  • MD5

    d6de0f3e1c48a27b5faf57e1cbfa9dee

  • SHA1

    98e904ec97f2935748c8a1ae4eb495106d7694e0

  • SHA256

    7f1e9af90e200297f571196bddb38f709ad401d154c72e3a5fa176acdda1b275

  • SHA512

    c651a5cf2b30abc04d0b24de25f22f913ee85932b11e5f2028c64882ed17c5198a899c02437e598bede06346a90a864dff53fe76e8170e377741f2d3d532c4f3

  • SSDEEP

    49152:/kTq24GjdGSiqkqXfd+/9AqYanieKdsY:/1EjdGSiqkqXf0FLYW

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1265032278363607131/tOKn_XQkvrbzfzOeYqDmmckZizHRfRbMGC1o6aw1l18vf8ahvf24H00Oupbp9BLtjrFb

Targets

    • Target

      StumbleMoon_Launcher.exe

    • Size

      1.6MB

    • MD5

      d6de0f3e1c48a27b5faf57e1cbfa9dee

    • SHA1

      98e904ec97f2935748c8a1ae4eb495106d7694e0

    • SHA256

      7f1e9af90e200297f571196bddb38f709ad401d154c72e3a5fa176acdda1b275

    • SHA512

      c651a5cf2b30abc04d0b24de25f22f913ee85932b11e5f2028c64882ed17c5198a899c02437e598bede06346a90a864dff53fe76e8170e377741f2d3d532c4f3

    • SSDEEP

      49152:/kTq24GjdGSiqkqXfd+/9AqYanieKdsY:/1EjdGSiqkqXf0FLYW

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Privilege Escalation

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks