Cyble has identified a new malware strain that targets both Windows and Linux Operating Systems dubbed “WhiteSnake”.
The WhiteSnake stealer was first discovered on cybercrime forums priced at $120/month $300/ 3 months $500/ 6 months $900/ 1 year $1500/ Lifetime.
Researchers noticed that the stealers binary undergoes frequent daily updates suggesting the malware is still under development.
The cyber-attack chain starts with spam emails containing an executable attachment that is disguised as a PDF document.
The attachment is in fact a BAT file that has been converted to an executable using “Bat2Exe”.
When executed it drops another BAT file onto a temporary folder and in turn executes it.
The new BAT file then spawns a PowerShell to download a file named “build.bat” from a discord URL and executes it.
The “build.bat” file contains the WhiteSnake stealer encoded in base64within itself.
It utilizes Certutil to decode the stealer saves it as “build.exe” within a temporary folder and executes it completing the deployment of the stealer.
The WhiteSnake stealer is capable ofcreating mutex to prevent reinfections anti-forensics with environmental checks.
Once it determines its safe to continue it gathers a spectrum of information including browser cookies autofills login Data and Web Data from the most used browsers.
The stealer is also able to steal various important files from various cryptocurrency wallets including from their browser extensions.
Furthermore it can steal sensitive data from messaging applications email clients and other specific applications.
All the data is then aggregated encrypted and finally exfiltrated through telegram.