MALICIOUS (1) campaign cataloged at 2024-12-26(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2024-12-syscontrol¶
Importing the module starts downloading and executing an Infostealer targeting browsers' and Discord data
In first packages, there was a hidden line triggering downloading and running an infostealer
Abuse categories¶
action-hidden-in-lib-usage
Campaign uses action-hidden-in-lib-usage.
exfiltration_browser_data
Campaign uses exfiltration_browser_data.
exfiltration_crypto
Campaign uses exfiltration_crypto.
infostealer
Campaign uses infostealer.
infostealer:kiwi
Campaign uses infostealer:kiwi.
obfuscation
Campaign uses obfuscation.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
hxxp://45.142.115.225:8000/grab/DaTDTcxiSvq9OA6r
-
hxxp://45.142.115.225:8000/inject/DaTDTcxiSvq9OA6r
-
hxxp://45.142.115.225:8000/grab/DaTDTcxiSvq9OA6r
-
hxxp://45.142.115.225:8000/repeter/DaTDTcxiSvq9OA6r
-
hxxps://cdn.discordapp.com/attachments/1086668425797058691/1113770559688413245/app.asar
-
hxxps://cdn.discordapp.com/attachments/1135684724585681039/1143224080603037827/app.asar
-
45.142.115.225