General
-
Target
22032025_0113_21032025_FACTURAS.gz
-
Size
36KB
-
Sample
250322-blcefsymt9
-
MD5
5a2d5fae2b06901cd2ec9eba2ca8049b
-
SHA1
65282682156719275be3254fc7170fdb8916e024
-
SHA256
a122f35e32fc7dfc16f5228e7accf3fb16f009e0ae023979b1946c3c08cf0380
-
SHA512
6c8c5ab39b7d5e5f87f5163b3b78a97eb8888decf12cd457534984354385d68ef7c68b8b999971749f66093c7a09749c2cdc692afe5eabb015a4b12f118f4c51
-
SSDEEP
768:g2CkbRCuKGJkQrww8+V8XbctZOA4yvhyNnw9CIxooxU4GitJLVkg:g2CvudZrwF+VactoDShyG9JbltAg
Static task
static1
Behavioral task
behavioral1
Sample
FACTURAS.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FACTURAS.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
stealerium
https://api.telegram.org/bot7756107542:AAEhuCgRX-ckFVwps3xqgrtyb3JVRKo9Tog/sendMessage?chat_id=
Targets
-
-
Target
FACTURAS.exe
-
Size
95KB
-
MD5
e945c5efd46a03fec5ab5c1d77b64e23
-
SHA1
c9b3edb25d29613fc859d0c6d24bea02f3031c3b
-
SHA256
5d2dd8452a0048b9d23499187fafc6e2cfd25efb72eee7f92657352e954bc160
-
SHA512
56724b9a9271fc87e57b0b042c4d6d5935ca604e24f10e06183a3612590aa15bdbf1bf1f020eeae45b10c611d591acd42d80c0dd3f923df93ba8615d5b314fbf
-
SSDEEP
1536:DGAIyl4VuPPlAlqFuJp2JxhVtPd9YebC+AARivhbv:aAI8QAFfPwVdhbv
-
Stealerium family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1