Kematian-Stealer : A Deep Dive into a New Information Stealer – CYFIRMA

Kematian-Stealer is a new open-source information stealer actively developed on GitHub by the Somali-Devs team, with major contributions from user KDot227. CYFIRMA details its loader-based delivery, Windows-focused data exfiltration via Discord webhooks, and ongoing developer activity, underscoring risks from openly available malware tooling. #Kematian-Stealer #Somali-Devs #KDot227 #DiscordWebhook #GitHub

Keypoints

  • Kematian-Stealer is a newly emerging information stealer distributed as open-source software on GitHub.
  • The GitHub account involved is “Somali-Devs,” with significant contributions from KDot227, indicating a close link among contributors.
  • The initial loader uses a batch script that creates a PowerShell script, adds Defender exclusions, creates a persistence mechanism (scheduled task), and attempts to download a secondary payload (main.exe).
  • Capabilities include harvesting data from messaging apps, gaming platforms, VPNs, email/FTP clients, password managers, and cryptocurrency wallets; it also captures webcam images and desktop screenshots, then compresses and exfiltrates data.
  • The builder for Kematian-Stealer enables customization of features and C2 details via a web interface, and the malware uses in-memory execution to avoid disk writes.
  • There is evidence of cross-linking between the KDot227 and Somali-Devs accounts, suggesting the same actor or tightly connected collaborators.
  • The report emphasizes open-source accessibility and deceptive educational framing, highlighting the need for strong defenses and vigilant monitoring against such tools.

MITRE Techniques

  • [T1566] Phishing – The loader was distributed via a RAR archive likely distributed through spam or phishing emails. Quote: “a RAR archive in the wild, likely distributed via spam or phishing emails.”
  • [T1566.001] Spear phishing Attachment – The delivery route is described as phishing emails; related content supports attachment-based spear-phishing in this context. Quote: “a RAR archive in the wild, likely distributed via spam or phishing emails.”
  • [T1059] User Execution – The batch script is designed to “execute a sequence of malicious actions to compromise Windows systems.” Quote: “The batch script to execute a sequence of malicious actions to compromise Windows systems.”
  • [T1204.002] Malicious File – The loader creates and runs a batch/PowerShell chain (e.g., “powershell.ps1”) to perform tasks. Quote: “creating a PowerShell script to perform several tasks” and “The batch script starts by checking if it is running with administrative privileges…”
  • [T1053] Scheduled Task/Job – The loader “creates a scheduled task for persistence” and to run at startup. Quote: “Creates a scheduled task named percs … startup with the highest privileges.”
  • [T1027] Obfuscated Files or Information – The loader “contains an obfuscated batch script in the resource section.” Quote: “contains an obfuscated batch script in the resource section.”
  • [T1564.001] Hidden Files and Directories – It “sets its attributes to hidden and system” to hinder discovery. Quote: “sets its attributes to hidden and system.”
  • [T1082] System Information Discovery – The script “Gathers various pieces of system information, including the public IP address, system information, UUID, MAC address, username, hostname, and network connections.” Quote: “Gathers various pieces of system information, including the public IP address, system information, UUID, MAC address, username, hostname, and network connections.”
  • [T1087] Account Discovery – The data collection includes user-related details such as username. Quote: “username” appears among gathered data.
  • [T1083] File & Directory Discovery – It “creates a directory (percs) in the APPDATA folder, copies itself (powershell.ps1) to this new directory and renames it to percs.ps1.” Quote: “Creates a directory (percs) in the APPDATA folder, copies itself (powershell.ps1) to this new directory and renames it to percs.ps1.”
  • [T1005] Data from Local System – It “constructs a detailed JSON payload with the collected information … and sends it to a Discord webhook.” Quote: “Constructs a detailed JSON payload with the collected information about the victim’s system … and sends it to a Discord webhook.”
  • [T1113] Screen Capture – It “captures images using the webcam and screenshots of the user’s desktop.” Quote: “Captures images using the webcam and screenshots of the user’s desktop.”
  • [T1105] Ingress Tool Transfer – It “downloads and executes additional scripts and payloads directly into memory.” Quote: “downloads and executes additional scripts and payloads directly into memory.”
  • [T1041] Exfiltration Over C2 Channel – Exfiltration occurs via a Discord webhook. Quote: “sends it to a Discord webhook.”
  • [T1048] Exfiltration Over Alternative Protocol – Exfiltration through Discord/webhook channels. Quote: “exfiltration process, sending sensitive data to the attacker’s Discord server” and related webhook references.
  • [T1485] Data Destruction – Clearing traces by deleting temporary files and the PowerShell script. Quote: “deletes temporary files and the executed PowerShell script to minimize evidence.”

Indicators of Compromise

  • [MD5 File Hash] – 736376a77af0a4eb7108ba02d989c137, 02f3b7596cff59b0a04fd2b0676bc395
  • [MD5 File Hash] – D2EA85153D712CCE3EA2ABD1A593A028, A3619B0A3EE7B7138CEFB9F7E896F168
  • [MD5 File Hash] – 18b5977b1a59c585f00ed7dca0fa81c9, 80CF2D7AE1F3ACC750F2CF454B4832C6
  • [File Name] – E3D0.bat, percs.ps1, powershell.ps1, main.ps1
  • [URL] – https://ptb.discord.com/api/webhooks/1247594902611562546/VpMh55OYaqHByOG1Q8vjiiF_seZ3lgXeGdLWhpxfr2UlP261GpZWDiu4lqiTNyAvsrs-, https://discord.gg/vk3rBhcj2y, https://github.com/KDot227/Powershell-Token-Grabber/releases/download/Fixed_version/main.exe, https://github.com/Somali-Devs/Kematian-Stealer/releases/download/Fixed_version/main.exe, https://github.com/Somali-Devs/Kematian-Stealer/
  • [URL] – https://github.com/KDot227/Powershell-Token-Grabber/, https://github.com/Somali-Devs/Kematian-Stealer/releases/download/AutoBuild/main.exe, https://github.com/Somali-Devs/Kematian-Stealer/blob/main/frontend-src/main.ps1
  • [URL] – https://raw.githubusercontent.com/Somali-Devs/Kematian-Stealer/main/frontend-src/blockhosts.ps1, https://github.com/Somali-Devs/Kematian-Stealer/releases/download/KematianBuild/kematian.bin
  • [IP Address] – 127.0.0.1 (localhost) used by the builder/private server (https://127.0.0.1:8080)

Read more: https://www.cyfirma.com/research/kematian-stealer-a-deep-dive-into-a-new-information-stealer/