Query Details

New Information Stealer Sams Stealer By CYFIRMA

Query

// New Information Stealer - SamsStealer (By CYFIRMA)
// https://www.linkedin.com/posts/activity-7198215669711052801-kQSk/

// SamsStealer: Unveiling the Information Stealer Targeting Windows Systems
// Link: https://lnkd.in/gF949sei

let WebTelegramPC =
DeviceNetworkEvents 
| where ActionType == @"HttpConnectionInspected"
| extend ConnectInfo = todynamic(AdditionalFields)
| extend HttpHost = ConnectInfo.host
| where HttpHost contains "web.telegram.org"
| distinct DeviceName;
DeviceEvents
| where DeviceName has_any(WebTelegramPC)
| where MD5=="83f94302ae92909bc3b2834a5342d4a5" or MD5=="824e149b9c2bdd5dbe37f472533230af"
or MD5=="1f913f8d71f0f4d65858b5ba0ea94a9c" or MD5=="56acc1496d8e5bbc0e412c683971b809"
or MD5=="631eacb4519fd49048491c9b5ec6bda5" or MD5=="64410e06f80e75b6503e5525c323243b"
or MD5=="7d63047a48fa8984f11544149c2f0e70" or MD5=="da493648ca3b8fd9dbad7bbca659b796"
or MD5=="02fe599ed41cc4bd54a1d6a3cc2d830a" or MD5=="cb95c77750732c0a4dd29c1d4feb6f69"
or MD5=="11751f8d847764936b7bf014302da87f" or MD5=="31c73ad35b23e4d98ed974e604b85e00"

Explanation

This KQL (Kusto Query Language) query is designed to detect potential infections of a new information stealer called "SamsStealer" on Windows systems. Here's a simplified breakdown of what the query does:

  1. Identify Devices Accessing Telegram Web:

    • The first part of the query (let WebTelegramPC = ...) identifies devices that have accessed the Telegram web application (web.telegram.org). It does this by looking at network events where HTTP connections were inspected and extracting the host information.
    • It then creates a list of distinct device names that have connected to web.telegram.org.
  2. Check for Known Malicious Files:

    • The second part of the query (DeviceEvents | ...) checks events on the devices identified in the first part.
    • It filters these events to find any that involve files with specific MD5 hashes known to be associated with SamsStealer. These MD5 hashes are unique identifiers for the malicious files.

In summary, the query first finds devices that have accessed Telegram's web application and then checks those devices for the presence of files known to be associated with the SamsStealer malware.

Details

Steven Lim profile picture

Steven Lim

Released: August 2, 2024

Tables

DeviceNetworkEventsDeviceEvents

Keywords

Devices

Operators

let|where==@extendtodynamiccontainsdistincthas_anyor

Actions