📃Title: Python-Based NodeStealer Version Targets Facebook Ads Manager
📅Date: 2024-12-19
🔗References:

Description

The latest variant of NodeStealer has evolved from JavaScript to Python, expanding its data theft capabilities. Trend Micro’s MXDR team uncovered this advanced version in a campaign targeting a Malaysian educational institution, linked to a Vietnamese threat group. The malware now targets Facebook Ads Manager accounts, stealing critical financial and business information alongside credit card details and browser data. The infection begins with a spear-phishing email containing a malicious link, which downloads and installs the malware disguised as a legitimate application. Sophisticated techniques like DLL sideloading and encoded PowerShell commands are used to bypass security and execute the final payload, exfiltrating data via Telegram.

🔖Rectifyq Taxonomies:

🔖MISP Galaxies:

  • producer Trend-Micro
  • target-information=“Malaysia”
  • sector=“Education”
  • malpedia=“NodeStealer”
  • malpedia=“Raspberry Robin”
  • country=“vietnam”
  • mitre-attack-pattern=[‘T1053.005’, ‘T1056.001’, ‘T1114.001’, ‘T1566.002’, ‘T1005’, ‘T1140’, ‘T1041’, ‘T1059.001’, ‘T1547.001’, ‘T1027’, ‘T1071.001’, ‘T1574.002’, ‘T1204.001’, ‘T1059.006’]

MISP event uuid: b84131c5-e0d4-406c-96f6-fd36461f0780

Indicator of Compromise (IoCs)

type,value,comment
sha256, 786db3ddf2a471516c832e44b0d9a230674630c6f99d3e61ada6830726172458, 'No sample in VT\r\nLast check:02/05/2025'
url, https://t.ly/MRAbJ, 'Malicious download link'
url, http://88.216.99.5:15707/entry.txt, ''

Full IOCs available in Rectifyq's MISP```