General
-
Target
25032025_0809_24032025_Listado FacturasPDF.gz
-
Size
2KB
-
Sample
250325-j2cddswqz2
-
MD5
3ba602b5726ab1ad2c4093c65437c150
-
SHA1
a47ad96120ff6247dd063bcc7d20527e7083d2fd
-
SHA256
bd78281db9ac530698843738a7d58ec552effaf67d872a2680aa2d1ffbf51812
-
SHA512
02c29ed77473f0fad613fa51a81f480ad494182ed277217f19cb36830ff5f8f36a5dd48ac2e0356c191e0dba5c028f58e4cc23f68aa06972c52e3db9141b883b
Static task
static1
Behavioral task
behavioral1
Sample
Listado Facturas.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Listado Facturas.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
stealerium
https://api.telegram.org/bot8046970687:AAE86CdNXbS3TQ4T-piDLSQDOwzq2IS8a68/sendMessage?chat_id=
Targets
-
-
Target
Listado Facturas.exe
-
Size
6KB
-
MD5
742079be072c5dc399608789694170d7
-
SHA1
516b4f2a968cfbf8f5b8ccc1628ef9503b72d6f4
-
SHA256
c060dd4aacd412f34349d8e246be541a3454f4af199a55eb6ceb92b5c2d21b97
-
SHA512
322601fa5267e9de1e080be1cbfbfb5359159a02e385a8cd4d5d476e2494c16380eea667329ee95da84dcf959bb95ec68ce3f657e1e5eeb4a0a68c74b2375179
-
SSDEEP
96:8878k+v/IRAsqj3tA7shArR5QjvfyEzNt:8Bb/+63W7SAD+vfyu
-
Stealerium family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1