General

  • Target

    rat.exe

  • Size

    1.6MB

  • Sample

    240925-nw2tbawhqd

  • MD5

    be830082457d9fc658309f95a07099da

  • SHA1

    8fcc5988cb62925e26c5f3567223fff79efa351e

  • SHA256

    f06316c624961051e89bfa9d6a2cd647e2749006eb2a867cac1976667055f3b4

  • SHA512

    af6d0264d77674fab722e6d0d268027a6053d942acfc9a8f3b94f4230842761411c081c9a78cc9c58865a4bc4d14680e963468db8d9a0ef69846cf4e9b87b430

  • SSDEEP

    24576:Yi2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywm0n:HTq24GjdGSiJxkqXfd+/9AqYanCLm

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1288466233993334785/bvXUkJru6bM4LZMznPzmSqzB7BV8e49Q0i4gDuNVtyNDqrIuEAvj0zzmaOdSBD0yMLcb

Targets

    • Target

      rat.exe

    • Size

      1.6MB

    • MD5

      be830082457d9fc658309f95a07099da

    • SHA1

      8fcc5988cb62925e26c5f3567223fff79efa351e

    • SHA256

      f06316c624961051e89bfa9d6a2cd647e2749006eb2a867cac1976667055f3b4

    • SHA512

      af6d0264d77674fab722e6d0d268027a6053d942acfc9a8f3b94f4230842761411c081c9a78cc9c58865a4bc4d14680e963468db8d9a0ef69846cf4e9b87b430

    • SSDEEP

      24576:Yi2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywm0n:HTq24GjdGSiJxkqXfd+/9AqYanCLm

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks