<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Apt37 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/apt37/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/apt37/feed.xml" rel="self" type="application/rss+xml"/><item><title>Braodo Stealer Screen Capture in TEMP Directory</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-braodo-screen-capture/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-braodo-screen-capture/</guid><description>This analytic detects the creation of screen capture files in the TEMP directory, specifically targeting activity associated with the Braodo stealer malware, which captures screenshots of the victim's desktop as part of its data theft activities.</description><content:encoded><![CDATA[<p>The Braodo stealer malware is known for capturing screenshots of a victim&rsquo;s desktop as part of its data theft activities. This malware, often distributed through malicious campaigns, targets sensitive information by creating image files of the user&rsquo;s active screen. These screenshots are typically saved in directories that are easily accessible and commonly used by malware, such as temporary folders. This technique allows attackers to gather credentials, financial information, or other confidential data displayed on the screen. The stealer has been observed in campaigns originating from Vietnam, targeting users in the United States with malware, fraud, and dropshipping schemes. Detecting and responding to these types of screen capture attempts is crucial for preventing sensitive data from being compromised and exfiltrated.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user unknowingly downloads and executes a malicious file, potentially delivered through a phishing email or drive-by download.</li>
<li>The Braodo stealer malware is executed on the victim&rsquo;s system.</li>
<li>The malware begins capturing screenshots of the victim&rsquo;s desktop using Windows APIs.</li>
<li>The screenshots are saved as .png, .jpg, or .bmp files.</li>
<li>The files are saved in the user&rsquo;s TEMP directory (e.g., C:\Users\<username>\AppData\Local\Temp\).</li>
<li>The malware may compress or encrypt the captured screenshots.</li>
<li>The malware exfiltrates the captured data to a command-and-control server.</li>
<li>The attacker gains access to sensitive information displayed on the victim&rsquo;s screen, such as credentials or financial data, and uses it for malicious purposes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the theft of sensitive information, including credentials, financial data, and personally identifiable information (PII). This can result in financial loss, identity theft, and reputational damage for the victim. The Braodo stealer has been observed targeting users in the United States, indicating a broad scope of potential victims. The malware&rsquo;s ability to capture screenshots allows attackers to bypass multi-factor authentication and other security measures that rely on information displayed on the screen.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 11 (FileCreate) logging to monitor file creation events on endpoints (required for the Sigma rules below).</li>
<li>Deploy the provided Sigma rule <code>Detect Screen Capture Files Created in TEMP Directory</code> to identify potential screen capture activity in temporary directories.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes creating image files in the TEMP directory.</li>
<li>Review and update endpoint security policies to prevent the execution of malware from temporary directories.</li>
<li>Monitor network traffic for suspicious outbound connections from processes creating screen capture files (T1071).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>stealc-stealer</category><category>crypto-stealer</category><category>braodo-stealer</category><category>apt37</category><category>hellcat-ransomware</category><category>vip-keylogger</category><category>screen-capture</category><category>malware</category></item></channel></rss>