General

  • Target

    RUNTIME 127.7.6.1.exe

  • Size

    1.6MB

  • Sample

    240919-ag4sgazhma

  • MD5

    883158f30de1e4d5713ef6c9dfeb4ff4

  • SHA1

    d8769685eae9a50b6606b65676c022df8495d809

  • SHA256

    936625532ae59fab0c9704750106123d552320710b65a77502f2e5deef86d37b

  • SHA512

    8798e22a8787255d1272c2a1e533a9d125228d52500307a6d326bfa6d0b69a67736fbd5d6ca9d510d0ed422894f239561f8ea2762f562e4b52ac7a170bc85219

  • SSDEEP

    24576:wi2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywf0n:PTq24GjdGSiJxkqXfd+/9AqYanCLf

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1286112348175597638/xMCQdfzeczl2y00CskX8uE5JTSqPzrQtqfGJnc7Q7S6Apa-49dy35klwwTIiCHyhzkqs

Targets

    • Target

      RUNTIME 127.7.6.1.exe

    • Size

      1.6MB

    • MD5

      883158f30de1e4d5713ef6c9dfeb4ff4

    • SHA1

      d8769685eae9a50b6606b65676c022df8495d809

    • SHA256

      936625532ae59fab0c9704750106123d552320710b65a77502f2e5deef86d37b

    • SHA512

      8798e22a8787255d1272c2a1e533a9d125228d52500307a6d326bfa6d0b69a67736fbd5d6ca9d510d0ed422894f239561f8ea2762f562e4b52ac7a170bc85219

    • SSDEEP

      24576:wi2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywf0n:PTq24GjdGSiJxkqXfd+/9AqYanCLf

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks