General
-
Target
FacturaHonorarios_2025-04-9.iso
-
Size
1.1MB
-
Sample
250409-h1zlvsszdt
-
MD5
b733ae5e018e2b524546f01a4fce2e3e
-
SHA1
a9ab761faa70fba6671bf51dcd40782aac6e7693
-
SHA256
aaa5c9077b9ca6f95da70f1c4df45f84c2fa48f62ad9548a7328add232978ebb
-
SHA512
354ec1a12d0ec1d64325b2e05eb342f309251bd2cf6c19931f8eb2ba92fce3dfa141d1a364d023b18b1e6362ca3f70be2205d439bb11567d47ddfec96e39ec44
-
SSDEEP
12288:9227fJXAg9x8ghMOEvFJ9eJ1rmRZ4L5vluMyiAL0L2c8QuU:9T7lpx8uMX/4J1rMZ4tFrA7cZ
Static task
static1
Behavioral task
behavioral1
Sample
Factura Honorarios_ 2025-04-9.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
Malware Config
Extracted
Protocol: smtp- Host:
aacrianca.pt - Port:
587 - Username:
[email protected] - Password:
ec98ret4
Extracted
stealerium
https://api.telegram.org/bot8148338634:AAFvLNrhxaF7bMPzQMLbUnueRMJvDIi5kcU/sendMessage?chat_id=
Targets
-
-
Target
Factura Honorarios_ 2025-04-9.exe
-
Size
545KB
-
MD5
0d6525a23326e202d8e6bf3796a2bc58
-
SHA1
4e4848828aa50fd6075f52fb47ff9a39e537da1f
-
SHA256
9c610dc246159235ce291264cf8f46ec080b74cdd27d0d5d23241c89792df5ad
-
SHA512
5c3b1fbe21ebeaeef6958336e7d42ac59b80823885f1fe9fbeb9917cb418b3a1287ebf6e78c82a3cfe7ad674799513a64286181feee1a5a19533448bf6b00583
-
SSDEEP
12288:T227fJXAg9x8ghMOEvFJ9eJ1rmRZ4L5vluMyiAL0L2c8QuUw:TT7lpx8uMX/4J1rMZ4tFrA7cZe
-
Guloader family
-
Stealerium family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
75ed96254fbf894e42058062b4b4f0d1
-
SHA1
996503f1383b49021eb3427bc28d13b5bbd11977
-
SHA256
a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7
-
SHA512
58174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4
-
SSDEEP
192:X24sihno0bW+l97H4GB7QDs91kMtwtobTr4u+QHbazMNHT7dmNIEr:m8vJl97JeoxtN/r3z7YV
Score3/10 -
MITRE ATT&CK Enterprise v16
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1