Cyble researchers report a threat actor began releasing MiniStealer’s builder and panel for free, with Parrot Stealer allegedly based on MiniStealer. The campaign targets Windows systems and steals data from Chromium-based browsers and FTP applications, signaling rapid evolution and potential marketing by the actor. Hashtags: #MiniStealer #ParrotStealer #Cyble #CRIL #Windows #Chromium #FTP
Keypoints
- Threat actor released MiniStealer’s builder and panel for free, then marketed Parrot Stealer as based on MiniStealer.
- MiniStealer targets Windows 7/10/11 and focuses on Chromium-based browsers and FTP applications for data theft.
- Builder loads a payload “stub” and writes C2 details, with a test button that sends logs to the C2 to verify connectivity.
- Parrot Stealer is presented as an upgraded, paid version likely built upon MiniStealer’s functionality.
- Technical features include a 64-bit .NET binary, timestomping, and multiple anti-analysis checks (profiling detection, debugger checks).
- Stolen data comes from browser configuration/files (AppDataBrowser) and from numerous Chromium-based browsers and FTP apps.
- A web panel is released by the TA to receive stolen data, underscoring exfiltration and C2-channel capabilities.
MITRE Techniques
- [T1204] User Execution – The test button shown in the figure below sends the Test Logs to the C&C server to check if the connection can be established. “The test button shown in the figure below sends the Test Logs to the C&C server to check if the connection can be established.”
- [T1497.001] Virtualization/Sandbox Evasion: System Checks – The stealer uses multiple AntiAnalysis checks to prevent debugging of the sample. To detect profiling, the code verifies if the COR_ENABLE_PROFILING environment variable is present and set to 1. “The stealer uses multiple AntiAnalysis checks to prevent debugging of the sample. To detect profiling, the code verifies if the COR_ENABLE_PROFILING environment variable is present and set to 1.”
- [T1070.006] Indicator Removal on Host: Timestomp – Mini Stealer is a 64-bit .NET-binary that uses Timestomping. Timestomping is a technique that modifies the timestamps of a file. “Mini Stealer is a 64-bit .NET-binary that uses Timestomping. Timestomping is a technique that modifies the timestamps of a file.”
- [T1555] Credentials from Password Stores – The stealer payload steals data from the following Chromium-based browsers and FTP applications. For the browser, the stealer copies certain files for exfiltration present in the AppDataBrowser directory, which stores user session and login credentials. “For the browser, the stealer copies certain files for exfiltration present in the AppDataBrowser directory, which stores user session and login credentials.”
- [T1539] Steal Web Session Cookie – See credentials extraction context in the browser/AppDataBrowser data exfiltration description. “The stealer copies certain files for exfiltration present in the AppDataBrowser directory, which stores user session and login credentials.”
- [T1552] Unsecured Credentials – See credentials context in the browser/AppDataBrowser data exfiltration description. “The stealer copies certain files for exfiltration present in the AppDataBrowser directory, which stores user session and login credentials.”
- [T1528] Steal Application Access Token – See credential access and browser data exfiltration context as it relates to token-like data within browsers and applications. “The stealer copies certain files for exfiltration present in the AppDataBrowser directory, which stores user session and login credentials.”
- [T1087] Account Discovery – The stealer targets a broad set of installed software to exfiltrate data from. “Over 25 Chromium-based browsers: Chrome, AvastBrowser, AVGBrowser, Browser360, CCleanerBrowser, CentBrowser, …”
- [T1518] Software Discovery – The malware enumerates numerous Chromium-based browsers it can exfiltrate data from. “Over 25 Chromium-based browsers: Chrome, AvastBrowser, AVGBrowser, Browser360, CCleanerBrowser, CentBrowser, …”
- [T1057] Process Discovery – The malware enumerates processes related to browsers and FTP clients to locate data to steal. “Over 20 FTP Applications: Filezilla, FlashFXP, AutoFTPManager, …”
- [T1007] System Service Discovery – The sample’s behavior indicates interactions with system-level components to access stored data, including AppDataBrowser data and browser files. “Figure 7 – File Details” (contextual reference to system data sources)
- [T1071] Application Layer Protocol – The exfiltration/C2 channel uses application-layer protocols to communicate with the C&C. “The test button shown in the figure below sends the Test Logs to the C&C server to check if the connection can be established.”
- [T1041] Exfiltration Over C2 Channel – A web panel is released to receive stolen data from a target network. “The TA released the source code of the web panel, which can be used to receive stolen data from a target network.”
Indicators of Compromise
- [MD5] Malicious binary – d65def0ad7f1b428bc1045cf2214b82f
- [SHA1] Malicious binary – e2beda0ef5d1c38bb96fb7eb6ee25990073e6a17
- [SHA256] Malicious binary – e837a0e6b01ca695010ee8bc4df57a6a9c6ef6e2c22e279501e06f61f0354f67
Read more: https://blog.cyble.com/2022/08/29/mini-stealer-possible-predecessor-of-parrot-stealer/