General

  • Target

    net8.0windows.rar

  • Size

    69KB

  • Sample

    241001-jwypfayern

  • MD5

    f5c0cace207517b9cb2d92a1f6a2fa9c

  • SHA1

    262b21de4b8a0b1c34269e65cba66215520d4983

  • SHA256

    2aba1393ad9d161d34c473e633196be971ac8d13a988fb4206568d739a8b5cfb

  • SHA512

    e53b510ac48352eb437943b0cbafd5de3f2ca22afc5d58d54af0a639d1d927a71fe3d5b6f65b476536d9f66a2639bd1ebaf482b07ab6d796d6df4c5d31a4243c

  • SSDEEP

    1536:ZUHUX4uLyZy2Jd9PEBiKx2qfE65xSXZrfjzgjepCrdQeGm:0Uou32rFEBiK8qsU0XFd+Gm

Malware Config

Extracted

Family

stealerium

C2

7960275769:AAFsNj7Q9GrsBKzVEmN2fGOLvIQWelRdwOA

Targets

    • Target

      RLTool.dll

    • Size

      13KB

    • MD5

      f05d4fc886f3a83be6f076941f8fa669

    • SHA1

      f2679402f45ebb3d6dc79ee204061d71eb6ba4ee

    • SHA256

      e574a9a0a146fb842332f480d7104824d4e52525d91a9c0e3225f817ea4e6ef8

    • SHA512

      19784eae098912158998fc8806a844497ed47afbe19a9f1a72021d26b0ca316eec33aa7faf202dafc9d5c06ce567bc10382fd907ed6f047ea8688cfdc3d32d86

    • SSDEEP

      384:ydm/klk7qv55LvQKrPhrIDfonEFrFx3X:AvtwWE3xH

    Score
    1/10
    • Target

      RLTool.exe

    • Size

      135KB

    • MD5

      d8dd178edd900a25706432da4168433c

    • SHA1

      6f97a417179ddcec0a90eeee4dffd76aa2602537

    • SHA256

      1e2b6bfb5d47fef87162614b2c6e5cecd46ce78a1d5cf7ea1744bc49dde8db5f

    • SHA512

      6f4b1e2c6c35136899f552c127d992ba30d505ba20f0d5da73801d43d1b1c0a7eb4029a544f5f5eb46a350c7555d4e6c6be6c55db33c4c6a7363f827b68857d8

    • SSDEEP

      3072:DjK4UGDHXrQ8hy7qgpHulWD9ZvZ5Pf3Ca10xuZ04ntfO6hBut:DjK4TDUqgpqWDLZ5H+xuZ04FhA

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables cmd.exe use via registry modification

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks