Concrete signature match: Password Stealer - Steals credentials and sensitive information for .NET (Microsoft Intermediate Language) platform, family Browsstl
PWS:MSIL/Browsstl.GG!MTB is a concrete detection for a highly sophisticated browser credential stealer, targeting sensitive user data like cookies, credit cards, and login credentials from browsers such as Chromium and Firefox. It leverages extensive hooking, anti-analysis techniques, and various system utilities for persistence, execution, and data exfiltration.
Relevant strings associated with this threat: - Debugger (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
rule PWS_MSIL_Browsstl_GG_2147773589_0
{
meta:
author = "threatcheck.sh"
detection_name = "PWS:MSIL/Browsstl.GG!MTB"
threat_id = "2147773589"
type = "PWS"
platform = "MSIL: .NET intermediate language scripts"
family = "Browsstl"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
threshold = "11"
strings_accuracy = "High"
strings:
$x_1_1 = "Browsers" ascii //weight: 1
$x_1_2 = "Chromium" ascii //weight: 1
$x_1_3 = "Firefox" ascii //weight: 1
$x_1_4 = "Cookies" ascii //weight: 1
$x_1_5 = "Credentials" ascii //weight: 1
$x_1_6 = "Credit_Cards" ascii //weight: 1
$x_1_7 = "Credit_Cards_Data" ascii //weight: 1
$x_1_8 = "Autofill" ascii //weight: 1
$x_1_9 = "Sqlite" ascii //weight: 1
$x_1_10 = "BCrypt" ascii //weight: 1
$x_1_11 = "Debugger" ascii //weight: 1
$x_1_12 = "get_IsAlive" ascii //weight: 1
condition:
(filesize < 20MB) and
(11 of ($x*))
}4dd7ebdae87ba28e49bbd828c1bb613c81c44d595be878532c2e8b7aac9c1414Immediately isolate affected systems, perform a full scan and removal of the malware using updated antivirus software. All potentially compromised credentials, especially those stored in web browsers, must be reset, and network activity should be closely monitored for exfiltration attempts.