General

  • Target

    22032025_0113_21032025_FACTURAS.gz

  • Size

    36KB

  • Sample

    250322-blcefsymt9

  • MD5

    5a2d5fae2b06901cd2ec9eba2ca8049b

  • SHA1

    65282682156719275be3254fc7170fdb8916e024

  • SHA256

    a122f35e32fc7dfc16f5228e7accf3fb16f009e0ae023979b1946c3c08cf0380

  • SHA512

    6c8c5ab39b7d5e5f87f5163b3b78a97eb8888decf12cd457534984354385d68ef7c68b8b999971749f66093c7a09749c2cdc692afe5eabb015a4b12f118f4c51

  • SSDEEP

    768:g2CkbRCuKGJkQrww8+V8XbctZOA4yvhyNnw9CIxooxU4GitJLVkg:g2CvudZrwF+VactoDShyG9JbltAg

Malware Config

Extracted

Family

stealerium

C2

https://api.telegram.org/bot7756107542:AAEhuCgRX-ckFVwps3xqgrtyb3JVRKo9Tog/sendMessage?chat_id=

Targets

    • Target

      FACTURAS.exe

    • Size

      95KB

    • MD5

      e945c5efd46a03fec5ab5c1d77b64e23

    • SHA1

      c9b3edb25d29613fc859d0c6d24bea02f3031c3b

    • SHA256

      5d2dd8452a0048b9d23499187fafc6e2cfd25efb72eee7f92657352e954bc160

    • SHA512

      56724b9a9271fc87e57b0b042c4d6d5935ca604e24f10e06183a3612590aa15bdbf1bf1f020eeae45b10c611d591acd42d80c0dd3f923df93ba8615d5b314fbf

    • SSDEEP

      1536:DGAIyl4VuPPlAlqFuJp2JxhVtPd9YebC+AARivhbv:aAI8QAFfPwVdhbv

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Stealerium family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks