General
-
Target
filw.exe
-
Size
6.1MB
-
Sample
250208-vszywaxqbm
-
MD5
a5dc5dfb3d20c67a35c1ee67e010fc7b
-
SHA1
94694b8cf4d9558014f78037e1fd6fcfe4ddd4e3
-
SHA256
1d810a842c4a71e7490f0a88bb9b0d3c82b084147e73fb2e4ef3c32456055d04
-
SHA512
e8c552eff3537974ef552cf500f7c1060c5bff409fdc8ff34f98544f27afa86fb15edd0930a3b9a699977c452c2115697354772d1b4e0f095744cf7491cc9a48
-
SSDEEP
196608:RaiSkSIlLTUcwti7TQl2NgVg01MWAXAkuujCPX9YG9he5GnQCAJKN:QkSopwtQQl2aOtXADu8X9Y95GQLJ
Behavioral task
behavioral1
Sample
filw.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
filw.exe
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral3
Sample
filw.exe
Resource
win11-20250207-en
Malware Config
Extracted
stealerium
https://api.telegram.org/bot7043342993:AAH3tTE7nerxLSr5-SkYKVrmJwCoBBaGRCU/sendMessage?chat_id=
-
url
https://szurubooru.zulipchat.com/api/v1/messages
Targets
-
-
Target
filw.exe
-
Size
6.1MB
-
MD5
a5dc5dfb3d20c67a35c1ee67e010fc7b
-
SHA1
94694b8cf4d9558014f78037e1fd6fcfe4ddd4e3
-
SHA256
1d810a842c4a71e7490f0a88bb9b0d3c82b084147e73fb2e4ef3c32456055d04
-
SHA512
e8c552eff3537974ef552cf500f7c1060c5bff409fdc8ff34f98544f27afa86fb15edd0930a3b9a699977c452c2115697354772d1b4e0f095744cf7491cc9a48
-
SSDEEP
196608:RaiSkSIlLTUcwti7TQl2NgVg01MWAXAkuujCPX9YG9he5GnQCAJKN:QkSopwtQQl2aOtXADu8X9Y95GQLJ
-
Stealerium family
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1