General

  • Target

    9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489.zip

  • Size

    3.5MB

  • Sample

    250210-tj267swqgk

  • MD5

    05c8b10e14dc47f0fc6d608a62a2d8d5

  • SHA1

    f2de3a1ceff42f5f103c0308450fce09c6e8f6b3

  • SHA256

    0c59bb8942ce85a4b199d143a03bee76034e49be7186fe650376a50a1030f24d

  • SHA512

    6dae3ac23ff7eacdb141a135254fe64625ba6699707dcc249ff1b8d5af7ae86f2367b2ea46dfc60e46a873b3cc6cf8f7b98cf33ff23ea160782d8118496d7124

  • SSDEEP

    98304:hVL7MaQDsU2/vrnP1WDBepcKWV8YjD1wpIkt8ixpBRf2zkH:/vMaQo5nTPYtepdKRgpBRf1H

Malware Config

Extracted

Family

stealerium

C2

https://api.telegram.org/bot7570347185:AAEz_VpR809OhOYFdcL_J8sQ3jA3OcwYJ8E/sendMessage?chat_id=

Attributes

Targets

    • Target

      9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489

    • Size

      3.6MB

    • MD5

      33bc39d2b142aac254ce2c8efc8de27a

    • SHA1

      95780b1b6c7f23f72b3e790d0809216bdfd670ba

    • SHA256

      9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489

    • SHA512

      eee09541f45bff4b304afd7e315711fcb9cc122f8418ea540d0a1672c149730dbbe51eb57a8344e0dfa15218d0ef5f78a2c67d25229fa564a62258ba0449c120

    • SSDEEP

      98304:CEjdGSi3kqXf0FLYWCLbi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13:k3kSILYWqZAkuujCPX9YG9he5GnQCAJS

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Stealerium family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks