General

  • Target

    USBDeviceDriver.exe

  • Size

    1.6MB

  • Sample

    240904-w2awsawcla

  • MD5

    6c573478bb39b6c75c4b5638a56220b7

  • SHA1

    26a519cf4cf34aeaccd8084e8f41ecad695216d3

  • SHA256

    116d51aa097e582fcddc683dba38a8d58379d842d86749759a39b8787a816da0

  • SHA512

    2b36dd9f9f3af2a6d2eea7c5dcb872e06b095349fc133a77ff427267ead0b3f454b4aebd83b44b4fa3dea771c9ed5f2b3875d29dcb04a192017549431419db94

  • SSDEEP

    49152:RcfTq24GjdGSiqkqXfd+/9AqYanieKdQ7:RcOEjdGSiqkqXf0FLYW

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1280955822868008990/uc6CjchX7Q8HfidEPNcoXcUpOOaF9I7SdZrxVEPNz0GcWiC3unwZgAsmKbHqyhYW590_

Targets

    • Target

      USBDeviceDriver.exe

    • Size

      1.6MB

    • MD5

      6c573478bb39b6c75c4b5638a56220b7

    • SHA1

      26a519cf4cf34aeaccd8084e8f41ecad695216d3

    • SHA256

      116d51aa097e582fcddc683dba38a8d58379d842d86749759a39b8787a816da0

    • SHA512

      2b36dd9f9f3af2a6d2eea7c5dcb872e06b095349fc133a77ff427267ead0b3f454b4aebd83b44b4fa3dea771c9ed5f2b3875d29dcb04a192017549431419db94

    • SSDEEP

      49152:RcfTq24GjdGSiqkqXfd+/9AqYanieKdQ7:RcOEjdGSiqkqXf0FLYW

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks