đ A CloudSEK se torna a primeira empresa de segurança cibernĂ©tica de origem indiana a receber investimentos da Estado dos EUA fundo
Leia mais

Category:Â
Malware Intelligence
Type/Family:Â
Stealer Malware
Industry:Â
Multiple
Region:Â
Global
â
â
CloudSEKâs contextual AI digital risk platform XVigil has discovered a post mentioning Bandit Stealer malware on a Russian-speaking underground forum where a threat actor vouched for it.

â
CloudSEK researchers recently discovered at least 14 IP addresses serving the Bandit Stealer web panel, most of which went down in a span of 24 hours. All of these IP addresses were running on port 8080.

â
â
Our source identified a few website endpoints that allowed access to the websiteâs internal system without entering the credentials due to a misconfiguration on the website.

â
Nothing particularly significant can be noted on the dashboard except a menu for options such as Builder and Results.

â
The Builder page shows the options for building a customized version of Bandit Stealer malware. And, in the stealer operation, threat actors utilize key elements to carry out their activities:


â
One of the discovered endpoints was /builds that had all the Bandit Stealer builder that had been generated so far by this particular panel. Our source was able to acquire them for further analysis.

â
Next, another identified endpoint was /clients with multiple instances of likely exfiltrated data from multiple IP addresses in JSON. In the JSON, the file name consists of the targetâs Country Code + Public IP address, followed by size and the exfiltration date and time. While our analysis confirms the data to be sent to the Telegram bot, but we assume the malware likely also keeps a copy of the exfiltrated data in its web panel.

â
Our source was able to exfiltrate the stealer logs from their web panel for Analysis. One of the log files was from the test machine with lots of screenshots which they might have used for testing the malware. The screenshot shows the process of anti-reversing tools being killed using Command Prompt. The other screenshot shows the same process using PowerShell. As the malware has screen capture capabilities, it is assumed that the malware have captured these screenshots during the infection (likely on the test machine).
â

â
â
Another screenshot reveals the usages of a Telegram bot in the stealer malware as the C2 communication channel.Â
â

â
The malware is being distributed through YouTube videos which is a commonly seen malware delivery mechanism among threat actors. In our previous report, we highlighted that since November 2022, there has been a 200-300% month-on-month increase in Youtube videos containing links to stealer malware such as Vidar, RedLine, and Raccoon in their descriptions.Â
â

â
Bandit Stealer, a newly discovered form of information stealer malware, showcases advanced capabilities and evasive techniques. Written in the Go language, it employs various methods to circumvent detection by debugging tools and virtual machine environments, ensuring its covert operations remain undetected.
â
To avoid analysis and hinder reverse engineering efforts, Bandit Stealer employs clever tactics. It actively checks for the presence of debuggers using techniques like IsDebuggerPresent and CheckRemoteDebuggerPresent. Furthermore, it possesses the ability to detect sandbox environments, swiftly shutting itself down if such environments are detected, thereby eluding analysis attempts. The malware even terminates reverse engineering tools that could potentially interfere with its functionality.
â
Notably, Bandit Stealer has been observed spreading through YouTube videos to reach mass users.
â
In order to establish persistence on infected systems, the malware creates an autorun registry entry, named "Bandit Stealer." By doing so, it ensures that the malicious code runs each time the machine is booted up.

â
â
O ladrĂŁo foi projetado para obter informaçÔes valiosas de PCs e usuĂĄrios. Ele coleta discretamente dados como detalhes do PC e do usuĂĄrio, capturas de tela, informaçÔes de geolocalização e IP, imagens de webcam e dados de navegadores populares, aplicativos de FTP e carteiras digitais. Os dados roubados sĂŁo entĂŁo enviados para um bot seguro do Telegram, empacotados em um arquivo ZIP para facilitar a transferĂȘncia.
â
O Stealer emprega uma lista negra selecionada obtida de um URL externo, em alguns casos um URL Pastebin, e a armazena em C:\Users\USERNAME\AppData\Roaming\blacklist.txt e o arquivo Ă© excluĂdo quando o ladrĂŁo termina a execução. Essa lista negra tem um papel crucial para determinar se o Stealer estĂĄ sendo executado em um ambiente sandbox/virtual ou em um sistema real. AlĂ©m disso, ajuda na identificação de processos especĂficos e na reversĂŁo de ferramentas que o Stealer pretende encerrar para impedir qualquer anĂĄlise potencial ou tentativa de engenharia reversa.
â

â

â


â
De acordo com nossa pesquisa de cĂłdigo aberto, parece que o Bandit Stealer usa uma rĂ©plica idĂȘntica doâblacklist.txtâarquivo de um projeto de malware ladrĂŁo de cĂłdigo aberto chamado EMPĂREO disponĂvel em Github.

â
â
O Bandit rouba dados do navegador da web que incluem o roubo de informaçÔes de login salvas, cookies cruciais, histórico de navegação e detalhes confidenciais de cartão de crédito armazenados no perfil de usuårio do navegador.
Aqui estĂĄ um exemplo de cookies do Firefox capturados pelo Bandit Stealer.

â
â
Os dados coletados sĂŁo entĂŁo empacotados em um arquivo ZIP e, em seguida, exfiltrados para o servidor C2, que aponta para o servidor Telegram (149,154,167,220).

â

â
â
â

â
â

â