General

  • Target

    Temp woofer.rar

  • Size

    1.5MB

  • Sample

    240917-srdyxazfld

  • MD5

    f2c6f31d7186069661900ee36ae3cdbf

  • SHA1

    b3d9d42d5950082d0bd0992e08cf95c64ab10d90

  • SHA256

    e25d9b3f9951f441e544ec1ff515a7edf660691b3256205c755e3c2aa7a0429a

  • SHA512

    5bf65b6cf0301719fecb40ce43e88af2345b962364ae6374edd1ca99153f921081df44e2a2c6c7421b86d4f75777d730db2d7e44d2055ca13b51b6ff5fadd998

  • SSDEEP

    24576:EwP97SdoiIec+t5d1AAHCDaAX/7ORii/52ks8eYPARK6tWR2tgLP77HDp2A/3g5P:PwnIec+t5dIeq/KTMks8eVfbE7TDp2SQ

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1285617774177161319/tMrhJuDO8czmq_b-937qRxuTdnQHhiFS_PygTehCI8RAUV1wNRZaDXwScpK7gRF2jWxF

Targets

    • Target

      Temp woofer/test.exe

    • Size

      1.6MB

    • MD5

      20e93026bee4ab2b660761da15a34902

    • SHA1

      2b7c425f6fd0f106bcbcfbe1f978bbd3928bce0a

    • SHA256

      e479bae61be6653faa02934e25ee488de09c326b1af8e1458a07b73e54f951ad

    • SHA512

      60a96c8df717905d8212e4903fdf24712781bd8dbbff50e4b65a559cbefad9d45dcc6b6f7f8f51c4959a05a928e71d1a5f0e260838db87b5e740c8807ce0db87

    • SSDEEP

      24576:ji2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywl0i:GTq24GjdGSiJxkqXfd+/9AqYanCLl

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks