General

  • Target

    25032025_0809_24032025_Listado FacturasPDF.gz

  • Size

    2KB

  • Sample

    250325-j2cddswqz2

  • MD5

    3ba602b5726ab1ad2c4093c65437c150

  • SHA1

    a47ad96120ff6247dd063bcc7d20527e7083d2fd

  • SHA256

    bd78281db9ac530698843738a7d58ec552effaf67d872a2680aa2d1ffbf51812

  • SHA512

    02c29ed77473f0fad613fa51a81f480ad494182ed277217f19cb36830ff5f8f36a5dd48ac2e0356c191e0dba5c028f58e4cc23f68aa06972c52e3db9141b883b

Malware Config

Extracted

Family

stealerium

C2

https://api.telegram.org/bot8046970687:AAE86CdNXbS3TQ4T-piDLSQDOwzq2IS8a68/sendMessage?chat_id=

Targets

    • Target

      Listado Facturas.exe

    • Size

      6KB

    • MD5

      742079be072c5dc399608789694170d7

    • SHA1

      516b4f2a968cfbf8f5b8ccc1628ef9503b72d6f4

    • SHA256

      c060dd4aacd412f34349d8e246be541a3454f4af199a55eb6ceb92b5c2d21b97

    • SHA512

      322601fa5267e9de1e080be1cbfbfb5359159a02e385a8cd4d5d476e2494c16380eea667329ee95da84dcf959bb95ec68ce3f657e1e5eeb4a0a68c74b2375179

    • SSDEEP

      96:8878k+v/IRAsqj3tA7shArR5QjvfyEzNt:8Bb/+63W7SAD+vfyu

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Stealerium family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks