Concrete signature match: Password Stealer - Steals credentials and sensitive information for .NET (Microsoft Intermediate Language) platform, family Stealgen
This is a concrete detection of PWS:MSIL/Stealgen.GA!MTB, a .NET-based password stealer that actively targets sensitive user data. It extracts browser credentials, cookies, and credit card information from applications like Google Chrome and attempts to exfiltrate this data, likely via Discord webhooks.
Relevant strings associated with this threat:
- \Google\Chrome\User Data\ (PEHSTR_EXT)
- \Screen. (PEHSTR_EXT)
- SELECT ExecutablePath, ProcessID FROM Win32_Process (PEHSTR_EXT)
- SbieDll.dll (PEHSTR_EXT)
- name="payload_json" (PEHSTR_EXT)
- https://discordapp.com/api/v{0} (PEHSTR_EXT)rule PWS_MSIL_Stealgen_GA_2147777923_0
{
meta:
author = "threatcheck.sh"
detection_name = "PWS:MSIL/Stealgen.GA!MTB"
threat_id = "2147777923"
type = "PWS"
platform = "MSIL: .NET intermediate language scripts"
family = "Stealgen"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
threshold = "10"
strings_accuracy = "High"
strings:
$x_1_1 = "Grabber" ascii //weight: 1
$x_1_2 = "Amex Card" ascii //weight: 1
$x_1_3 = "Mastercard" ascii //weight: 1
$x_1_4 = "PK11SDR_Decrypt" ascii //weight: 1
$x_1_5 = "\\Google\\Chrome\\User Data\\" ascii //weight: 1
$x_1_6 = "encryptedPassword" ascii //weight: 1
$x_1_7 = "Cookies" ascii //weight: 1
$x_1_8 = "CreditCards" ascii //weight: 1
$x_1_9 = "\\Screen." ascii //weight: 1
$x_1_10 = "SELECT ExecutablePath, ProcessID FROM Win32_Process" ascii //weight: 1
$x_1_11 = "ExploitDirectory" ascii //weight: 1
$x_1_12 = "ExpYear" ascii //weight: 1
$x_1_13 = "A310Logger" ascii //weight: 1
condition:
(filesize < 20MB) and
(10 of ($x*))
}416e0a8dcc571341da149109a17826c645f55ac3fd1eb2eab31098abb83af1720d6f87aa1826205087affc7248276844f30898daa0eabad676c549459b8e8722Immediately isolate the infected system from the network, perform a full system scan with updated antivirus/EDR, and then reset all passwords for accounts whose credentials might have been stored in web browsers on the compromised machine. Monitor financial accounts for suspicious activity and educate users on phishing threats.