Overview
overview
10Static
static
10net8.0-win...er.exe
windows10-ltsc 2021-x64
1net8.0-win...er.exe
windows10-ltsc 2021-x64
8net8.0-win...ion.js
windows10-ltsc 2021-x64
3net8.0-win...ion.py
windows10-ltsc 2021-x64
3net8.0-win...px.exe
windows10-ltsc 2021-x64
5net8.0-win...I2.dll
windows10-ltsc 2021-x64
1net8.0-win...on.dll
windows10-ltsc 2021-x64
1net8.0-win...nt.dll
windows10-ltsc 2021-x64
1net8.0-win...on.bat
windows10-ltsc 2021-x64
8net8.0-win...ll.bat
windows10-ltsc 2021-x64
1net8.0-win...nt.dll
windows10-ltsc 2021-x64
3General
-
Target
Astral-Stealer-v1.8.zip
-
Size
5.0MB
-
Sample
250113-v5cn4s1kft
-
MD5
99f1133043b27927628725cdedab82fc
-
SHA1
5c5eff02b8cd8468638712cef2f58df38b678c8a
-
SHA256
cf0b47eafa7787a698bc8dbb62d18f1d16d0659ff7bd7e6312ccb50b08b754b6
-
SHA512
62c751ef8d6f4977f8eaca662213532eacbcd14debdab16f85c4750e5385d78f55ed8f24a929aba82a719e4fda429be61e15a109bf26178f887636465b4b4497
-
SSDEEP
98304:VKq8KgB9itUfnBgeOCR3zyISfP/5Jyb6LswnFbkcoIyeU6t:VKq8KS9itUfnBgeOC1zan5J9LLoLIf
Behavioral task
behavioral1
Sample
net8.0-windows/Astral Stealer.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral2
Sample
net8.0-windows/Astral Stealer.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral3
Sample
net8.0-windows/Astral_assets/Injection/discord-injection.js
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
net8.0-windows/Astral_assets/obfuscation/obfuscation.py
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral5
Sample
net8.0-windows/Astral_assets/upx/upx.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral6
Sample
net8.0-windows/Guna.UI2.dll
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral7
Sample
net8.0-windows/Newtonsoft.Json.dll
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral8
Sample
net8.0-windows/System.Management.dll
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral9
Sample
net8.0-windows/install-python.bat
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral10
Sample
net8.0-windows/install.bat
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral11
Sample
net8.0-windows/runtimes/win/lib/net7.0/System.Management.dll
Resource
win10ltsc2021-20250113-en
Malware Config
Targets
-
-
Target
net8.0-windows/Astral Stealer.dll
-
Size
2.1MB
-
MD5
aae3db3d79052fbdd65728644d0b778b
-
SHA1
f0dbb597f050d060e4dc6c7c44ed4edccccdae3f
-
SHA256
9e2e1e1392cbd5097033cfd40a1d496f9bb31003d7c80cba53eb8cdd100531f4
-
SHA512
c2fca2b32f1170df4d2aa348ec2276318edaf69d22d983fb7bab6fc0a19a80d29539c969e602c6c2ac318bfed0b15692acd5b31cac8018eb5ed43c0dce5fead2
-
SSDEEP
49152:DxsrbCb35u50T5u50T5u50T5u50T5u50T5u50Ls25u50S5u50:DCncpMyMyMyMyMyMTEMnM
Score1/10 -
-
-
Target
net8.0-windows/Astral Stealer.exe
-
Size
139KB
-
MD5
726c717d3e26f216b316f169ae4befd2
-
SHA1
673efa718917cfd5685a3fa91f8ca0607ee59bda
-
SHA256
1e7a930303762a3a1f8678da099225d9276d1a9fa16ced07a9fb4f14e0201bd9
-
SHA512
2438ec07d41d19f7c4aa1885408784f5d68bcf979b5481cf0de14bfdb5d91d9b96ef6d651291733e4141e4b8f23bbb139baa04ebb92033ca9c4b9797519adb52
-
SSDEEP
3072:PiS4omp03WQthI/9S3BZi08iRQ1G78IVn2sbS7cJp8lt2:PiS4ompB9S3BZi0a1G78IVAcLct
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Probable phishing domain
-
-
-
Target
net8.0-windows/Astral_assets/Injection/discord-injection.js
-
Size
87KB
-
MD5
f09e312599375709a60d60e87d4317ee
-
SHA1
55dab351087947ecbf2a745a47476c2dbcfe907e
-
SHA256
1df7b0b11b9eca886e8ad118efe0196ca3202f08a2f803c9ed62c99b14d7b386
-
SHA512
87d78a313eb2515b65d4b33b1ff787d17ad48180b17b03c30cd342a9ece0049e40e411ac91f950b3fece43658624cffb9808da3fbdf1f30e9ff0be3c1e54be76
-
SSDEEP
1536:tK4SxabNH1fyDsH4ntTVPV3yTMHQHiM+ta0QUta+Yx4Y7tn1/yDsHYXicLjFfVnM:jb11fyDsH4ntT1V3yTMHQHiMMYx4Y71n
Score3/10 -
-
-
Target
net8.0-windows/Astral_assets/obfuscation/obfuscation.py
-
Size
6KB
-
MD5
285744b7932bde6ca1bf8ca33534736a
-
SHA1
44226fba522b7deb198ac8eb98bbd148c11ae1de
-
SHA256
7445dc0c6dafacfe6cda1bf5ac93efb0eab39f1d1f787195c93a8d9b9d8aea75
-
SHA512
a27b5aa08329bd841c76a7d89872b95f12b083970c8c343973a18d8b15739d88d61f651078d4beefb954d13ef50e1db30eff549512db318257016bca7ea28f44
-
SSDEEP
96:BFokKZB5DqxqDxkyjAMwRw+UVt4LsevwLzRCS:BFoTqxyxHjV9nt4IevwLMS
Score3/10 -
-
-
Target
net8.0-windows/Astral_assets/upx/upx.exe
-
Size
525KB
-
MD5
8a98406e32ed6139bd9e75342d452948
-
SHA1
ed77737b88a7351d0bc5f542ddb7ce84f8f95588
-
SHA256
a4240ea0e8a916d15f8391edef9705ab4de1f516dd360f0a336c5358686d434b
-
SHA512
f5b17975560d97308a6ee66845225715e82bade9df7bc36821c76fe67fcf8d22929bf21b85e28dd11b7399d0109ab1f3786fd2010c2e5023d3a93d2bd5cf678b
-
SSDEEP
12288:fOHsWPQsJdQmiR0eYG16fyP8RHzS75CaNgMYqIW7I2:2QmiWK16rRHzS7U6ip2
Score5/10 -
-
-
Target
net8.0-windows/Guna.UI2.dll
-
Size
2.1MB
-
MD5
b429ae86c5be521bc8ca3b164cec3acb
-
SHA1
387560073ff5a1f2191abc6f75fc34532bbb6dd2
-
SHA256
3ac70532408b89159bfe235d4ed228faa03ae3fbd63ec6a82d895f287a3b0579
-
SHA512
eae65de53da50708983ed8ebf9e1e3dd5f9aea95a354d272e199bb59517f62bfe35f0df7a37d81ab0423d0d6d29304fa70284c731bd54023e446b2c19bacafb1
-
SSDEEP
24576:DgWuftU4WrNOA6sM6kXxMfNmnjk/c5NrH0UUoo2QkJXVSItH5ppoO0KzJ6nFwHQL:DA+NOpXm1mnj0cP+DkhMAiawnFV
Score1/10 -
-
-
Target
net8.0-windows/Newtonsoft.Json.dll
-
Size
695KB
-
MD5
adf3e3eecde20b7c9661e9c47106a14a
-
SHA1
f3130f7fd4b414b5aec04eb87ed800eb84dd2154
-
SHA256
22c649f75fce5be7c7ccda8880473b634ef69ecf33f5d1ab8ad892caf47d5a07
-
SHA512
6a644bfd4544950ed2d39190393b716c8314f551488380ec8bd35b5062aa143342dfd145e92e3b6b81e80285cac108d201b6bbd160cb768dc002c49f4c603c0b
-
SSDEEP
12288:mFIM0KteTMN4Or4D3OdmZg5WHEaEDIGBBjgrIQtD+tVqDMW:6zMTMNNd+g5Wk78GBBjgrIQtDF
Score1/10 -
-
-
Target
net8.0-windows/System.Management.dll
-
Size
72KB
-
MD5
1c71e5310151ce1e9a3a92797776bdad
-
SHA1
fd452b874fec4a9dae61a3710fb32749dc7d701e
-
SHA256
f515ca5c944c332ab706ff0a7c2e53e66d0d9d8a663e9b2691b35129ee22559b
-
SHA512
2a4f18c77449c2d06a3ab6807338f73b03b1faa332e78319829ba3a2b6fd98bb9a83c5e29b47d55e4ce7f0dfdcd8524fa592a0f3ca8ee09daae2894b681265a8
-
SSDEEP
768:BrEP45HksbMU3se5c/0b/9nLZV1BCUkVoV0lP7H0CkkiSLJKdbY8Mtuo0eDQP9zu:bbz5wulNV1zkSQzHxkxS9yc8no0nzu
Score1/10 -
-
-
Target
net8.0-windows/install-python.bat
-
Size
683B
-
MD5
d2582c98db5aad03be0d391a265f861b
-
SHA1
bb545f83d8d69c8a1a08cd773ddcb53689e8f57c
-
SHA256
44d62021bd4fa1870a45fc9f1b9bb978196987452688060a87ee97e4626fa4af
-
SHA512
268a5a71c70081ee8d6aa34d0a9158740712e174a70a0fac2972bd8fa812c34107ba2859d2f31391cc4b27f3f81a986160d9feb14880bdf02fe0c43567b2afbe
Score8/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
-
-
Target
net8.0-windows/install.bat
-
Size
38B
-
MD5
667537a1c25c3050eba77c74a343329f
-
SHA1
794df2143bd7bd07f9ade899d8fb1055b93236ea
-
SHA256
60e27d880d37915497117cecaf8919b5330ff908880451e937d4a83a8f563375
-
SHA512
19ec6064e8ed3ecf531bb8f051b88314c12e55dafd1380830acdf3496c3f863f8ba4dbb14a898cc4d2523846dfba5b021d4716b55781830be7fcf0bbae3dd011
Score1/10 -
-
-
Target
net8.0-windows/runtimes/win/lib/net7.0/System.Management.dll
-
Size
288KB
-
MD5
76e0aaa7182e77403bf6fe2af8d90f28
-
SHA1
d013c5d649f9ebce5bee1c8b774f3290b1f1f532
-
SHA256
a7e248c3e6f25f4673e2006fa77f4a4322a3c74c2652dcc395178329feb7ff28
-
SHA512
8e161a375fe174d9b203c2a098c92aff411d8521eef133d5174ae7409c394157f7a067c2a9dfe3f76cb02acbed52c33a11579b9a1cbee75e4092e6487d1a7bc1
-
SSDEEP
6144:TMbKUVLmD7HP9ab+T5sBFzPnQpEZFAc2Q:45VL2Z++tw92Q
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1SIP and Trust Provider Hijacking
1