DataSafe Thief Variant A
| Label | thief_plan.ps1 datasafe_snatch.ps1 |
| Fingerprint | 2f8bf3e5b6cbdb0c8e5935b078711867 1fbe357c26133a4b39b96fdd2c48f1ae |
| Identity Check | Ca4fea2deacb9665461eb74b6422b137326c0d76 57ab6bdbb41289f3c8983d5b48fc98c08782ed1f |
| Hash Code | B29e630b9c70b0daaba4f83489494444c04c7a470b9c24eb4ddffb6cd7cf05ff 677601f72181c53541f850248dd0904153ea62458489d7aa782149b93399ebd8 |
| Volume | 368111 bytes 371740 bytes |
| Format | PowerShell |
Upon activation, the malicious program gathers comprehensive system data, encompassing antivirus solutions, installed applications, network connectors, active programs, and more. It also retrieves confidential details like Wi-Fi access codes, Windows activation keys, clipboard past activities, and user sessions from various messaging platforms, VPN services, VNC systems, FTP applications, and password storage tools. Additionally, it acquires files from user directories using specified terms and file types as outlined below:
$searchTerms = @(“2fa”, “acc”, “account”, “auth”, “backup”, “bank”, “binance”, “bitcoin”, “bitwarden”, “btc”, “casino”, “code”, “coinbase “, “crypto”, “dashlane”, “discord”, “eth”, “exodus”, “facebook”, “funds”, “info”, “keepass”, “keys”, “kraken”, “kucoin”, “lastpass”, “ledger”, “login”, “mail”, “memo”, “metamask”, “mnemonic”, “nordpass”, “note”, “pass”, “passphrase”, “proton”, “paypal”, “pgp”, […])
$permittedFormats = @(“*.jpg”, “*.png”, “*.rdp”, “*.txt”, “*.doc”, “*.docx”, “*.pdf”, “*.csv”, “*.xls”, “*.xlsx”, “*.ldb”, “*.log”, “*.pem”, “*.ppk”, “*.key”, “*.pfx”)
Figure 21 below demonstrates the process of how the malware identifies a target device.
