General

  • Target

    test.exe

  • Size

    1.6MB

  • Sample

    240917-sr6nxszhqn

  • MD5

    20e93026bee4ab2b660761da15a34902

  • SHA1

    2b7c425f6fd0f106bcbcfbe1f978bbd3928bce0a

  • SHA256

    e479bae61be6653faa02934e25ee488de09c326b1af8e1458a07b73e54f951ad

  • SHA512

    60a96c8df717905d8212e4903fdf24712781bd8dbbff50e4b65a559cbefad9d45dcc6b6f7f8f51c4959a05a928e71d1a5f0e260838db87b5e740c8807ce0db87

  • SSDEEP

    24576:ji2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywl0i:GTq24GjdGSiJxkqXfd+/9AqYanCLl

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1285617774177161319/tMrhJuDO8czmq_b-937qRxuTdnQHhiFS_PygTehCI8RAUV1wNRZaDXwScpK7gRF2jWxF

Targets

    • Target

      test.exe

    • Size

      1.6MB

    • MD5

      20e93026bee4ab2b660761da15a34902

    • SHA1

      2b7c425f6fd0f106bcbcfbe1f978bbd3928bce0a

    • SHA256

      e479bae61be6653faa02934e25ee488de09c326b1af8e1458a07b73e54f951ad

    • SHA512

      60a96c8df717905d8212e4903fdf24712781bd8dbbff50e4b65a559cbefad9d45dcc6b6f7f8f51c4959a05a928e71d1a5f0e260838db87b5e740c8807ce0db87

    • SSDEEP

      24576:ji2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywl0i:GTq24GjdGSiJxkqXfd+/9AqYanCLl

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks