Bandit Stealer, a recently discovered information stealer by Trend Micro, effectively targets cryptocurrency wallets and web browsers while skillfully avoiding detection.
The malware prioritizes Windows as its target and leverages the legitimate command-line tool runas[.]exe to execute programs under different user permissions.
The objective is to elevate privileges, gain administrative access, and bypass security measures to collect extensive user data efficiently.
Due to its use of the Go programming language, the malware exhibits cross-platform compatibility, enabling it to expand its impact to various platforms.
Bandit Stealer employs sandbox detection mechanisms to adapt its behavior and evade detection or analysis based on specific indicators it checks for:-
Including a Linux-specific command in the malware suggests that it may be designed to infect Linux machines and is likely undergoing testing, as accessing the “/proc/self/status” file path on a Windows system would lead to an error.
The malware retrieves and saves the content from a Pastebin link (hxxps[:]//pastebin[.]com/raw/3fS0MSjN) in the AppData folder, as a file called “blacklist.txt.”
Here below, we have mentioned all the details that this list contains:-
While all these details primarily serve the purpose of identifying whether the malware is operating within a sandbox or undergoing testing.
The malware spreads via phishing emails, disguising itself as a harmless MS Word attachment that distracts the user while initiating the infection process in the background.
Microsoft’s access control mechanism runs malware as an administrator with credentials, useful when the user lacks sufficient privileges for program execution.
The malware modifies the Windows Registry, persists, and collects personal and financial data from crypto wallets and web browsers.
Bandit Stealer steals Telegram sessions for unauthorized access, enabling impersonation and malicious actions like accessing private messages and data.
Here below, we have mentioned the browsers:-
Here below, we have mentioned all the wallets that are scanned:-
Here below, we have mentioned the types of data that are stolen from the victim’s browser:-
Researchers found a fake Heart Sender installer that tricks users into launching embedded malware, automating spam SMS and email sending.
Stolen information from Bandit Stealer and similar stealers enables attackers to engage in identity theft, data breaches, financial gain, account hijacking, credential-stuffing, selling to other cybercriminals, and conducting follow-on attacks like double extortion and ransomware.
Shut Down Phishing Attacks with Device Posture Security – Download Free E-Book
Students, authors, and anybody else wishing to improve their vocabulary and language abilities frequently utilize…
The financially motivated GOLD MELODY threat group has been active at least since 2017, attacking…
MOVEit transfer service pack has been discovered with three vulnerabilities associated with SQL injections (2)…
A new financially motivated threat group named “LUCR-3” has been discovered targeting organizations to steal…
For taking part in a large international scheme to earn millions of dollars by selling pirated…