General

  • Target

    cstealer.exe

  • Size

    20.9MB

  • Sample

    250328-yzg87a1sbs

  • MD5

    40cce5a074d7d41f24b79f293e4a7bc5

  • SHA1

    3a7206262e5977dcb9d0179e5b5f04a45cb53b6c

  • SHA256

    bc424fa116202a1cca16fc04a8ae6a211e3783ddb460faa6b22f565f360c1c11

  • SHA512

    310c4d62dd5a06226b0e5a7a9a5bd4c64b15c44703e8e618ce9c944276eac3e879182943e062db0e364f7b9699514a3d54d82fb2040e81cf50627637e9406fb3

  • SSDEEP

    393216:89YiVVlj87dt8WdqODLfHqO1UTdQJl3wF3MnG3CblCOL/AJ0bderWM4uYyk5aH:89YiVVl8ZO8ETdQC3MGVOb1b6UA

Malware Config

Targets

    • Target

      cstealer.exe

    • Size

      20.9MB

    • MD5

      40cce5a074d7d41f24b79f293e4a7bc5

    • SHA1

      3a7206262e5977dcb9d0179e5b5f04a45cb53b6c

    • SHA256

      bc424fa116202a1cca16fc04a8ae6a211e3783ddb460faa6b22f565f360c1c11

    • SHA512

      310c4d62dd5a06226b0e5a7a9a5bd4c64b15c44703e8e618ce9c944276eac3e879182943e062db0e364f7b9699514a3d54d82fb2040e81cf50627637e9406fb3

    • SSDEEP

      393216:89YiVVlj87dt8WdqODLfHqO1UTdQJl3wF3MnG3CblCOL/AJ0bderWM4uYyk5aH:89YiVVl8ZO8ETdQC3MGVOb1b6UA

    • CStealer

      CStealer is an open-source infostealer written in Python and packaged with PyInstaller.

    • Cstealer family

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks