close
The Wayback Machine - http://web.archive.org/web/20210203094931/https://medium.com/s2wlab/w1-feb-en-story-of-the-week-stealers-on-the-darkweb-49945a31601d

W1 Feb| EN | Story of the week: Stealers on the Darkweb

Hyunmin Suh
Feb 3 · 7 min read

Co-author: Minjei Cho, Researcher at S2W LAB

Image for post
Image for post

Before deep dive into credential/info stealers in the dark web, let’s have a look at the term.

  • Credential/Info Stealer — malware that is collecting credential information such as login information saved in browser. It is often associated with Remote Access Tools (RATs) & Botnets.

Much has been discussed about the stealers and the market interlinked with the dark web and surface web, but there aren’t many simple and easy-to-understand diagram in accordance with the supply chain how this malicious ecosystem works from the dark web to the surface web. To help you better understand, we’ve attempted to divide the system into five stages based on what we observed.

Image for post
Image for post

1. Sellers of the stealer

Image for post
Image for post

Besides AZORult, there are two other famously mentioned stealers, Vidar stealer and Raccoon stealer.

VIDAR stealer is sold on a Russian speaking hacking forum and has operated since Nov, 2018. The price of Vidar ranges from $130~$750 depending on the usage period. Vidar is written in C++ and it searches wide range of following data:

Image for post
Image for post
  • All popular browsers of different bit sizes (passwords, cookies, autofill)
  • Wallets of cryptocurrencies
  • CC — Card data other than CVV
  • Files
  • Telegram authorization (Windows)
  • Browser history (Last 10,000 entries from a specific browser)
  • FTP, WINSCP, MAIL

Raccoon, also found on a Russian speaking hacking forum, has operated since April, 2019. The price ranges from $75~$200 depending on the duration which has a similar pricing scheme to Vidar, and other stealers in general. It is written in C/C++ and it works on 32/64-bit systems without dependencies on .NET framework. Features include:

Image for post
Image for post
  • Information found in popular browsers (passwords, cookies, autofill)
  • IP
  • Geographical information
  • Credit Card
  • Wallets of cryptocurrencies
  • System Information

2. Distribution method

Image for post
Image for post
Vidar disguised as KMSauto authentication tool, source: ASEC Blog

Stealer can also be distributed within a ransomware campaign. PC risk published an article that Vidar was once used with Gandcrab campaign (2019) that the stealer took a role of downloading additional forms of malware which showed it was more capable than just an info stealer. https://www.pcrisk.com/internet-threat-news/14270-vidar-and-gandcrab-distributed-in-same-campaign

Image for post
Image for post
Vidar and GandCrab distributed in the same campaign, source: pcrisk.com

In other case, it appeared in a new spam campaign along with Nemty Special Edition Ransomware targeting South Korean in May 2020. https://asec.ahnlab.com/ko/1316/

Image for post
Image for post
Image for post
Image for post
(Left) Fake job application, (Right) Spam Emails masquerading as ‘Korean Fair Trade Commission’, source: ASEC blog

Inside the attachment of the fake job application email, two executable files exist in a compressed format (.zip) shown in picture below.

Image for post
Image for post
Two executable files compressed in attachment of the fake job application email, source: ASEC blog

Both executables are disguised as Nemty and Vidar. While Nemty ransomware focusing on encrypting user files, Vidar is used to exfiltrate credential information in this instance.

3. Exploring the details of stealers

Main functions of stealers

#Collect Browser Information

  • Passwords
  • Saved Logins / Autofills
  • Payment Methods
  • Cookies

#Copying Files

  • Copy all files from a certain directory
  • Copy files
  • Specific Apps or Software files ( Bitcoin wallet, Telegram, etc )

#Send System Information

  • OS version
  • Username
  • IP Address

#Account theft in various applications

#Screenshot

#Additional Malware Download

How Stealers Steal Data

Stealer can steal information stored in the browser by performing decryption with the user’s authority. In the case of Chrome, the credential information is normally encrypted and stored in SQLite format if the user chooses the option to save the login information. If the user revisits the site, chrome browser will decrypt the information stored in the SQLite database with user’s authority which the malware can do the same.

Image for post
Image for post
Example of Imported Login Data of Chrome Browser to SQLite

4. Stolen Information evidenced in DDW (Deep, Dark Web)

1) Botnet Market

Genesis Market is known to be the biggest dark web market specialty in followings:

  • FingerPrints(FP)
  • Cookies
  • Inject Scripts info
  • Form Grabbers (Logs)
  • Saved Logins
  • Other personal data obtained from different devices in the web
Image for post
Image for post
Main page of genesis market

Bots are sold in following format:

Image for post
Image for post

The price of each product seems to fluctuate substantially depending on the importance of cookies and its quantity. The average price of product usually positioned from $10~$30 as seen in the above picture. However, if the number of cookies is sufficient and its information is highly relevant to financial accounts, the price may take up to $350.

Image for post
Image for post

2) Carding forum

A perfect example of carding site is ‘Joker’s stash’ but the operator of Joker’s stash claims to leave for a retirement a month after the domain seizure taken by FBI and Interpol. https://threatpost.com/jokers-stash-carding-site-taken-down/162548/

Despite the absence of Joker’s Stash, there are still flooding number of carding sites in Russian speaking forums selling credit card information. There can be many other techniques to obtain credit card information from the victim’s device, and stealers will do such a thing to collect all the credit card information viciously to be dumped and sold on carding forums.

Image for post
Image for post

3) Hacking forum

The stealers’ logs are not just sold in the carding forums and botnet markets but they are often shared in closed Russian speaking hacking forums. The below picture is posted this early week 1st of February, 2021, titled ‘858 LOGS MIX WORLDWIDE FOR FREE 2020’. These logs are often shared without compensations, and the size of logs files can range from couple of MBs to tens of GBs.

Image for post
Image for post

5. Where to use

  1. Finding any financial related accounts such as paypal login information in order to get a fraudulent access to the account.
Image for post
Image for post

In genesis market, it is not hard to find a paypal login information which stored in the chrome browser. Detail information can be seen after purchasing the product.

Below picture is a sample of pay account found in the stealer logs which was shared on an Russian speaking hacking forum.

Image for post
Image for post

It may require many tries to find an account with big valid budgets, but the activity of sharing botnet/stealers logs doesn’t seem to decrease.

2. Stealing corporate login information of the victim trying to access to its corporate portal remotely

We have observed many urls that are seem to be corporate related accounts such as azure or aws, cloud-like accounts.

Image for post
Image for post
Image for post
Image for post

Adversary favours the accounts named ‘administrator’ OR ‘admin’ will likely be attempted with brute force attack.

3. Information gathering at a national level

In Genesis market, there is a dashboard showing the list of current bots per country and how many have been added. Since the bots are classified with the country code, adversary or the ‘client’ can have an intuitive view of victims by country. In this sense, the information can be efficiently collected if the user is targeting specific country or language.

Image for post
Image for post

In overall, we have observed the supply chain and its distributional channels of stealers in five stages. As already mentioned earlier, much has been discussions about stealers, botnets, markets or hacking forums but we would like to emphasize the fact that the dark web is very closely interlinked with the surface web and that it can always be a threat to anyone regardless. Understanding the circulation of stealers in cyber criminal ecosystem will eventually become a great help to preventing more victims.

S2W LAB BLOG

S2W LAB BLOG

Medium is an open platform where 170 million readers come to find insightful and dynamic thinking. Here, expert and undiscovered voices alike dive into the heart of any topic and bring new ideas to the surface. Learn more

Follow the writers, publications, and topics that matter to you, and you’ll see them on your homepage and in your inbox. Explore

If you have a story to tell, knowledge to share, or a perspective to offer — welcome home. It’s easy and free to post your thinking on any topic. Write on Medium

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store