{"id":15050,"date":"2019-04-09T08:10:14","date_gmt":"2019-04-09T16:10:14","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/04\/09\/news-8799\/"},"modified":"2019-04-09T08:10:14","modified_gmt":"2019-04-09T16:10:14","slug":"news-8799","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/04\/09\/news-8799\/","title":{"rendered":"Say hello to Baldr, a new stealer on the market"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Tue, 09 Apr 2019 15:00:13 +0000<\/strong><\/p>\n<p><em>By\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/author\/wtsing\" target=\"_blank\" rel=\"noopener\">William Tsing<\/a>, <a href=\"https:\/\/blog.malwarebytes.com\/author\/vhioureas\" target=\"_blank\" rel=\"noopener\">Vasilios Hioureas<\/a>, and <a href=\"https:\/\/blog.malwarebytes.com\/author\/jeromesegura\" target=\"_blank\" rel=\"noopener\">J\u00e9r\u00f4me Segura<\/a><\/em><\/p>\n<p>Over the past few months, we have noticed increased activity and development of new stealers. One such new stealer, called Baldr, first appeared in January 2019, and our analysis of this malware finds that its authors were serious about making a long-lasting product.<\/p>\n<p>Unlike many banking Trojans that wait for the victim to log into their bank&#8217;s website, stealers typically operate in grab-and-go mode. This means that upon infection, the malware will collect all the data it needs and exfiltrate it right away. Because such stealers are often non-resident (meaning they have no persistence mechanism) unless they are detected at the time of the attack, victims will be none-the-wiser that they have been compromised.<\/p>\n<p>This type of malware is popular among criminals and covers a greater surface than more specialized bankers. On top of capturing browser history, stored passwords, and cookies, stealers will also look for files that may contain valuable data.<\/p>\n<p>In this blog post, we will review the Baldr stealer by looking at its introduction in cybercrime forums and its distribution in the wild.<\/p>\n<h3>Baldr on the market<\/h3>\n<p>Baldr is likely the work of three threat actors: Agressor for distribution, Overdot for sales and promotion, and LordOdin for development. Appearing first in January, Baldr quickly generated many positive reviews on most of the popular clearnet Russian hacking forums.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37976\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/baldrad\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrad.png\" data-orig-size=\"2536,1020\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"baldrad\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrad-300x121.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrad-600x241.png\" class=\"alignnone wp-image-37976 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrad.png\" alt=\"\" width=\"2536\" height=\"1020\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrad.png 2536w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrad-300x121.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrad-600x241.png 600w\" sizes=\"auto, (max-width: 2536px) 100vw, 2536px\" \/><\/p>\n<p>Previously associated with the Arkei stealer (seen below), Overdot posts a majority of advertisements across multiple message boards, provides customer service via Jabber, and addresses buyer complaints in the reputational system used by several boards.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37979\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/overdot1\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/overdot1.png\" data-orig-size=\"1218,420\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"overdot1\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/overdot1-300x103.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/overdot1-600x207.png\" class=\"alignnone size-large wp-image-37979\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/overdot1-600x207.png\" alt=\"\" width=\"600\" height=\"207\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/overdot1-600x207.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/overdot1-300x103.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/overdot1.png 1218w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Of interest is a forums post referencing Overdot&#8217;s previous work with Arkei, where he claims that the developers of both Baldr and Arkei are in contact and collaborate on occasion.<\/p>\n<p>Unlike most products posted on clearnet boards, Baldr has a reputation for reliability, and it also offers relatively good communication with the team behind it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37977\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/arkei\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/arkei.png\" data-orig-size=\"2646,406\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"arkei\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/arkei-300x46.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/arkei-600x92.png\" class=\"alignnone wp-image-37977 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/arkei.png\" alt=\"\" width=\"2646\" height=\"406\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/arkei.png 2646w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/arkei-300x46.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/arkei-600x92.png 600w\" sizes=\"auto, (max-width: 2646px) 100vw, 2646px\" \/><\/p>\n<p>LordOdin, also known as BaldrOdin, has a significantly lower profile in conjunction with Baldr, but will monitor and like posts surrounding it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37997\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/contact-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/contact.png\" data-orig-size=\"789,119\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"contact\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/contact-300x45.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/contact-600x90.png\" class=\"alignnone size-full wp-image-37997\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/contact.png\" alt=\"\" width=\"789\" height=\"119\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/contact.png 789w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/contact-300x45.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/contact-600x90.png 600w\" sizes=\"auto, (max-width: 789px) 100vw, 789px\" \/><\/p>\n<p>He primarily posts to differentiate Baldr from competitor products like Azorult, and vouches that Baldr is not simply a reskin of Arkei:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37982\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/baldrarkei\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrarkei.png\" data-orig-size=\"2724,482\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"baldrarkei\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrarkei-300x53.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrarkei-600x106.png\" class=\"alignnone wp-image-37982 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrarkei.png\" alt=\"\" width=\"2724\" height=\"482\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrarkei.png 2724w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrarkei-300x53.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrarkei-600x106.png 600w\" sizes=\"auto, (max-width: 2724px) 100vw, 2724px\" \/><\/p>\n<p>Agressor\/Agri_MAN is the final player appearing in Baldr&#8217;s distribution:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37983\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/agriman\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/agriman.png\" data-orig-size=\"1418,260\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"agriman\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/agriman-300x55.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/agriman-600x110.png\" class=\"alignnone size-large wp-image-37983\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/agriman-600x110.png\" alt=\"\" width=\"600\" height=\"110\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/agriman-600x110.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/agriman-300x55.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/agriman.png 1418w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37984\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/agressorrep\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/agressorrep.png\" data-orig-size=\"2238,824\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"agressorrep\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/agressorrep-300x110.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/agressorrep-600x221.png\" class=\"alignnone wp-image-37984 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/agressorrep.png\" alt=\"\" width=\"2238\" height=\"824\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/agressorrep.png 2238w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/agressorrep-300x110.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/agressorrep-600x221.png 600w\" sizes=\"auto, (max-width: 2238px) 100vw, 2238px\" \/><\/p>\n<p>Agri_MAN has a history of selling traffic on Russian hacking forums dating back roughly to 2011. In contrast to LordOdin and Overdot, he has a more checkered reputation, showing up on a blacklist for chargebacks, as well as getting called out for using sock puppet accounts to generate good reviews.<\/p>\n<p>Using the alternate account Agressor, he currently maintains an automated shop to generate Baldr builds at\u00a0<em>service-shop[.]ml<\/em>. Interestingly, Overdot makes reference to an automated installation bot that is not connected to them, and is generating complaints from customers:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37985\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/possibleimitators\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/possibleimitators.png\" data-orig-size=\"2116,296\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"possibleimitators\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/possibleimitators-300x42.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/possibleimitators-600x84.png\" class=\"alignnone wp-image-37985 size-full\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/possibleimitators.png\" alt=\"\" width=\"2116\" height=\"296\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/possibleimitators.png 2116w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/possibleimitators-300x42.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/possibleimitators-600x84.png 600w\" sizes=\"auto, (max-width: 2116px) 100vw, 2116px\" \/><\/p>\n<p>This may indicate Agressor is an affiliate and not directly associated with Baldr development. At presstime, Overdot and LordOdin appear to be the primary threat actors managing Baldr.<\/p>\n<h3>Distribution<\/h3>\n<p>In our analysis of Baldr, we collected a few different versions, indicating that the malware has short development cycles. The latest version analyzed for this post is version 2.2, announced March 20:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37999\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/2-2-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2.2.png\" data-orig-size=\"1187,484\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"2.2\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2.2-300x122.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2.2-600x245.png\" class=\"alignnone size-full wp-image-37999\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2.2.png\" alt=\"\" width=\"1187\" height=\"484\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2.2.png 1187w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2.2-300x122.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2.2-600x245.png 600w\" sizes=\"auto, (max-width: 1187px) 100vw, 1187px\" \/><\/p>\n<p>We captured Baldr via different distribution chains. One of the primary vectors is the use of Trojanized applications disguised as cracks or hack tools. For example, we saw a video posted to YouTube offering a program to generate free Bitcoins, but it was in fact the Baldr stealer in disguise.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37989\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/freebitcoins\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/freebitcoins.png\" data-orig-size=\"669,339\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"freebitcoins\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/freebitcoins-300x152.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/freebitcoins-600x304.png\" class=\"alignnone size-full wp-image-37989\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/freebitcoins.png\" alt=\"\" width=\"669\" height=\"339\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/freebitcoins.png 669w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/freebitcoins-300x152.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/freebitcoins-600x304.png 600w\" sizes=\"auto, (max-width: 669px) 100vw, 669px\" \/><\/p>\n<p>We also caught Baldr via a drive-by campaign involving the Fallout exploit kit:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37988\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/falloutexploitkit\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/falloutexploitkit.png\" data-orig-size=\"603,130\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"falloutexploitkit\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/falloutexploitkit-300x65.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/falloutexploitkit-600x129.png\" class=\"alignnone size-full wp-image-37988\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/falloutexploitkit.png\" alt=\"\" width=\"603\" height=\"130\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/falloutexploitkit.png 603w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/falloutexploitkit-300x65.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/falloutexploitkit-600x129.png 600w\" sizes=\"auto, (max-width: 603px) 100vw, 603px\" \/><\/p>\n<h3>Technical analysis (Baldr 2.2)<\/h3>\n<p>Baldr\u2019s high level functionality is relatively straight forward, providing a small set of malicious abilities in the version of this analysis. There is nothing ground breaking as far as what it\u2019s trying to do on the user\u2019s computer, however, where this threat differentiates itself is in its extremely complicated implementation of that logic.<\/p>\n<p>Typically, it is quite apparent when a malware is thrown together for a quick buck vs. when it is skillfully crafted for a long-running campaign. Baldr sits firmly in the latter category\u2014it is not the work of a script kiddie. Whether we are talking about its packer usage, payload code structure, or even its backend C2 and distribution, it&#8217;s clear Baldr&#8217;s authors spent a lot of time developing this particular threat.<\/p>\n<h4>Functionality overview<\/h4>\n<p>Baldr&#8217;s main functionality can be broken down into five steps, which are completed in chronological order.<\/p>\n<p><strong>Step 1: User profiling<\/strong><\/p>\n<p>Baldr starts off by gathering a list of user profiling data. Everything from the user account name to disk space and OS type is enumerated for exfiltration.<\/p>\n<p><b>Step 2: Sensitive data exfiltration<\/b><\/p>\n<p>Next, Baldr begins cycling through all files and folders within key locations of the victim computer. Specifically, it looks in the user <em>AppData<\/em> and <em>temp<\/em> folders for information related to sensitive data. Below is a list of key locations and application data it searches:<\/p>\n<pre>AppDataLocalGoogleChromeUser DataDefault  AppDataLocalGoogleChromeUser DataDefaultLogin Data  AppDataLocalGoogleChromeUser DataDefaultCookies  AppDataLocalGoogleChromeUser DataDefaultWeb Data  AppDataLocalGoogleChromeUser DataDefaultHistory  AppDataRoamingExodusexodus.wallet  AppDataRoamingEthereumkeystore   AppDataLocalProtonVPN   WalletsJaxx   Liberty   NordVPN   Telegram   Jabber   TotalCommander   Ghisler<\/pre>\n<p>Many of these data files range from simple sqlite databases to other types of custom formats. The authors have a detailed knowledge of these target formats, as only the key data from these files is extracted and loaded into a series of arrays. After all the targeted data has been parsed and prepared, the malware continues onto its next functionality set.<\/p>\n<p><strong>Step 3: ShotGun file grabbing<\/strong><\/p>\n<p>DOC, DOCX, LOG, and TXT files are the targets in this stage. Baldr begins in the Documents and Desktop directories and recursively iterates all subdirectories. When it comes across a file with any of the above extensions, it simply grabs the entire file\u2019s contents.<\/p>\n<p><strong>Step 4: ScreenCap<\/strong><\/p>\n<p>In this last data-gathering step, Baldr gives the controller the option of grabbing a screenshot of the user\u2019s computer.<\/p>\n<p><strong>Step 5: Network exfiltration<\/strong><\/p>\n<p>After all of this data has been loaded into organized and categorized arrays\/lists, Baldr flattens the arrays and prepares them for sending through the network.<\/p>\n<p>One interesting note is that there is no attempt to make the data transfer more inconspicuous. In our analysis machine, we purposely provided an extreme number of files for Baldr to grab, wondering if the malware would slowly exfiltrate this large amount of data, or if it would just blast it back to the C2.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"38016\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/zip-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/zip.png\" data-orig-size=\"134,136\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"zip\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/zip.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/zip.png\" class=\"alignnone size-full wp-image-38016\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/zip.png\" alt=\"\" width=\"134\" height=\"136\" \/><\/p>\n<p>The result was one large and obvious network transfer. The malware does not have built-in functionality to remain resident on the victim\u2019s machine. It has already harvested the data it desires and does not care to re-infect the same machine. In addition, there is no spreading mechanism in the code, so in a corporate environment, each employee would need to be manually targeted with a unique attempt.<\/p>\n<h4>Packer code level analysis<\/h4>\n<p>We will begin with the payload obfuscation and packer usage. This version of Baldr starts off as an AutoIt script built into an exe. Using a freely available AIT decompiler, we got to the first stage of the packer below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37955\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/1-57\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/1.png\" data-orig-size=\"2492,1070\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"1\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/1-300x129.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/1-600x258.png\" class=\"alignnone size-full wp-image-37955\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/1.png\" alt=\"\" width=\"2492\" height=\"1070\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/1.png 2492w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/1-300x129.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/1-600x258.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/1-195x85.png 195w\" sizes=\"auto, (max-width: 2492px) 100vw, 2492px\" \/><\/p>\n<p>As you can see, this code is heavily obfuscated. The first two functions are the main workhorse of that obfuscation. What is going on here is simply reordering of the provided string, according to the indexes passed in as the second parameter. This, however, does not pose much of a problem as we can easily extract the strings generated by simply modifying this script to <em>ConsoleWrite<\/em> out the deobfuscated strings before returning:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37956\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/2-45\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2.png\" data-orig-size=\"2470,158\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"2\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2-300x19.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2-600x38.png\" class=\"alignnone size-full wp-image-37956\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2.png\" alt=\"\" width=\"2470\" height=\"158\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2.png 2470w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2-300x19.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/2-600x38.png 600w\" sizes=\"auto, (max-width: 2470px) 100vw, 2470px\" \/><\/p>\n<p>The resulting strings extracted are below:<\/p>\n<pre>Execute  BinaryToString  @TempDir  @SystemDir  @SW_HIDE  @StartupDir  @ScriptDir  @OSVersion  @HomeDrive  @CR  @ComSpec  @AutoItPID  @AutoItExe  @AppDataDir  WinExists  UBound  StringReplace  StringLen  StringInStr  Sleep  ShellExecute  RegWrite  Random  ProcessExists  ProcessClose  IsAdmin  FileWrite  FileSetAttrib  FileRead  FileOpen  FileExists  FileDelete  FileClose  DriveGetDrive  DllStructSetData  DllStructGet  DllStructGetData  DllStructCreate  DllCallAddress  DllCall  DirCreate  BinaryLen  TrayIconHide  :Zone.Identifier  kernel32.dll  handle  CreateMutexW  struct*  FindResourceW  kernel32.dll  dword  SizeofResource  kernel32.dll  LoadResource  kernel32.dll  LockResource  byte[  VirtualAlloc  byte shellcode [  <\/pre>\n<p>In addition to these obvious function calls, we also have a number of binary blobs which get deobfuscated. We have included only a limited set of these strings as to not overload this analysis with long sets of data.<\/p>\n<p>We can see that it is pulling and decrypting a resource DLL from within the main executable, which will be loaded into memory. This makes sense after analyzing a previous version of Baldr that did not use AIT as its first stage. The prior versions of Baldr required a secondary file named\u00a0<em>Dulciana.\u00a0<\/em>So, instead of using AIT, the previous versions used this file containing the encrypted bytes of the same DLL we see here:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37957\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/3-38\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/3.png\" data-orig-size=\"1184,376\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"3\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/3-300x95.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/3-600x191.png\" class=\"alignnone size-full wp-image-37957\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/3.png\" alt=\"\" width=\"1184\" height=\"376\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/3.png 1184w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/3-300x95.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/3-600x191.png 600w\" sizes=\"auto, (max-width: 1184px) 100vw, 1184px\" \/><\/p>\n<p>Moving forward to stage two, all things essentially remain equal throughout all versions of the Baldr packer. We have the DLL loaded into memory, which creates a child process of the main Baldr executable in a suspended state and proceeds to hollow this process, eventually replacing it with the main .NET payload. This makes manually unpacking with ollyDbg nice because after we break on child Baldr.exe load, we can step through the remaining code of the parent, which writes to process memory and eventually calls <em>ResumeThread()<\/em>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37958\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/4-25\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/4.png\" data-orig-size=\"1052,1024\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"4\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/4-300x292.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/4-600x584.png\" class=\"alignnone size-large wp-image-37958\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/4-600x584.png\" alt=\"\" width=\"600\" height=\"584\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/4-600x584.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/4-300x292.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/4.png 1052w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>As you can see, once the child process is loaded, the functions that it has set up to call contain <em>VirtualAlloc, WriteProcessMemory, <\/em>and<em> ResumeThread,<\/em> which gives us an idea what to look out for.\u00a0If we dump this written memory right before resume thread is called, we can then easily extract the main payload.<\/p>\n<p>Our colleague <a href=\"https:\/\/twitter.com\/hasherezade\" target=\"_blank\" rel=\"noopener\">@hasherezade<\/a> has made this step-by-step video of unpacking Baldr:<\/p>\n<p><iframe  src='https:\/\/www.youtube.com\/embed\/E2V4kB_gtcQ?version=3&#038;rel=1&#038;fs=1&#038;autohide=2&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;wmode=transparent' width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/p>\n<h4>Payload code analysis<\/h4>\n<p>Now that we have unpacked the payload, we can see the actual malicious functionality. However, this is where our troubles began.\u00a0For the most part, malware written in any interpreted language is a relief for a reverse engineer as far as ease of analysis goes. Baldr, on the other hand, managed to make the\u00a0debugging and analysis of its source code a difficult task, despite being written in C#.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37959\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/5-19\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/5.png\" data-orig-size=\"1592,1012\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"5\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/5-300x191.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/5-600x381.png\" class=\"alignnone size-large wp-image-37959\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/5-600x381.png\" alt=\"\" width=\"600\" height=\"381\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/5-600x381.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/5-300x191.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/5.png 1592w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The code base of this malware is not straight forward. All functionality is heavily abstracted, encapsulated in wrapper functions, and utilizes a ton of utility classes. Going through this code base of around 80 separate classes and modules, it is not easy to see where the key functionality lies. Multiple static passes over the code base are necessary to begin making sense of it all. Add in the fact that the function names have been mangled and junk instructions are inserted throughout the code, and the next step would be to start debugging the exe with DnSpy.<\/p>\n<p>Now we get to our next problem: threads. Every minute action that this malware performs is executed through a separate thread. This was obviously done to complicate the life of the analyst. It would be accurate to say that there are over 100 unique functions being called inside of threads throughout the code base. This does not include the threads being called recursively, which could become thousands.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37960\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/6-14\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/6.png\" data-orig-size=\"1092,1206\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"6\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/6-272x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/6-543x600.png\" class=\"alignnone size-large wp-image-37960\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/6-543x600.png\" alt=\"\" width=\"543\" height=\"600\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/6-543x600.png 543w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/6-272x300.png 272w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/6.png 1092w\" sizes=\"auto, (max-width: 543px) 100vw, 543px\" \/><\/p>\n<p>Luckily, we can view local data as it is being written, and eventually we are able to locate the key sections of code:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37961\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/7-11\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/7.png\" data-orig-size=\"550,79\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"7\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/7-300x43.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/7.png\" class=\"alignnone size-full wp-image-37961\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/7.png\" alt=\"\" width=\"550\" height=\"79\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/7.png 550w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/7-300x43.png 300w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37962\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/8-6\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/8.png\" data-orig-size=\"1746,514\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"8\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/8-300x88.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/8-600x177.png\" class=\"alignnone size-full wp-image-37962\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/8.png\" alt=\"\" width=\"1746\" height=\"514\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/8.png 1746w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/8-300x88.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/8-600x177.png 600w\" sizes=\"auto, (max-width: 1746px) 100vw, 1746px\" \/><\/p>\n<p>The function pictured above gathers the user&#8217;s profile, as mentioned previously. This includes the CPU type, computer name, user accounts, and OS.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37963\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/9-4\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/9.png\" data-orig-size=\"1546,634\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"9\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/9-300x123.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/9-600x246.png\" class=\"alignnone size-full wp-image-37963\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/9.png\" alt=\"\" width=\"1546\" height=\"634\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/9.png 1546w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/9-300x123.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/9-600x246.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/9-965x395.png 965w\" sizes=\"auto, (max-width: 1546px) 100vw, 1546px\" \/><\/p>\n<p>After the entire process is complete, it flattens the arrays storing this data, resulting in a string like this:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37964\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/10-4\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/10.png\" data-orig-size=\"2918,1800\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"10\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/10-300x185.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/10-600x370.png\" class=\"alignnone size-full wp-image-37964\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/10.png\" alt=\"\" width=\"2918\" height=\"1800\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/10.png 2918w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/10-300x185.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/10-600x370.png 600w\" sizes=\"auto, (max-width: 2918px) 100vw, 2918px\" \/><\/p>\n<p>The next section of code shows one of the many enumerator classes used to cycle directories, looking for application data, such as stored user accounts, which we purposely saved for testing.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37966\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/12-4\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/12.png\" data-orig-size=\"472,38\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"12\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/12-300x24.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/12.png\" class=\"alignnone size-full wp-image-37966\" style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/12.png\" alt=\"\" width=\"472\" height=\"38\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/12.png 472w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/12-300x24.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/12-470x38.png 470w\" sizes=\"auto, (max-width: 472px) 100vw, 472px\" \/><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37965\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/11-5\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/11.png\" data-orig-size=\"1456,996\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"11\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/11-300x205.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/11-600x410.png\" class=\"alignnone size-full wp-image-37965\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/11.png\" alt=\"\" width=\"1456\" height=\"996\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/11.png 1456w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/11-300x205.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/11-600x410.png 600w\" sizes=\"auto, (max-width: 1456px) 100vw, 1456px\" \/><\/p>\n<p>The data retrieved was saved into lists in the format below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37967\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/13-4\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/13.png\" data-orig-size=\"1424,270\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"13\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/13-300x57.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/13-600x114.png\" class=\"alignnone size-full wp-image-37967\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/13.png\" alt=\"\" width=\"1424\" height=\"270\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/13.png 1424w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/13-300x57.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/13-600x114.png 600w\" sizes=\"auto, (max-width: 1424px) 100vw, 1424px\" \/><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37968\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/15-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/15.png\" data-orig-size=\"1770,432\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"15\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/15-300x73.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/15-600x146.png\" class=\"alignnone size-full wp-image-37968\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/15.png\" alt=\"\" width=\"1770\" height=\"432\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/15.png 1770w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/15-300x73.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/15-600x146.png 600w\" sizes=\"auto, (max-width: 1770px) 100vw, 1770px\" \/><\/p>\n<p>In the final stage of data collection, we have the threads below, which cycle the key directories looking for txt and doc files. It will save the filename of each txt or doc it finds, and store the file&#8217;s contents in various arrays.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37972\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/18\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/18.png\" data-orig-size=\"1570,188\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"18\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/18-300x36.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/18-600x72.png\" class=\"alignnone size-full wp-image-37972\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/18.png\" alt=\"\" width=\"1570\" height=\"188\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/18.png 1570w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/18-300x36.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/18-600x72.png 600w\" sizes=\"auto, (max-width: 1570px) 100vw, 1570px\" \/><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37969\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/14-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/14.png\" data-orig-size=\"1046,556\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"14\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/14-300x159.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/14-600x319.png\" class=\"alignnone size-full wp-image-37969\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/14.png\" alt=\"\" width=\"1046\" height=\"556\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/14.png 1046w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/14-300x159.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/14-600x319.png 600w\" sizes=\"auto, (max-width: 1046px) 100vw, 1046px\" \/> <img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37970\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/16-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/16.png\" data-orig-size=\"1004,196\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"16\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/16-300x59.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/16-600x117.png\" class=\"alignnone size-full wp-image-37970\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/16.png\" alt=\"\" width=\"1004\" height=\"196\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/16.png 1004w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/16-300x59.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/16-600x117.png 600w\" sizes=\"auto, (max-width: 1004px) 100vw, 1004px\" \/> <img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37971\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/17-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/17.png\" data-orig-size=\"1144,218\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"17\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/17-300x57.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/17-600x114.png\" class=\"alignnone size-full wp-image-37971\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/17.png\" alt=\"\" width=\"1144\" height=\"218\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/17.png 1144w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/17-300x57.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/17-600x114.png 600w\" sizes=\"auto, (max-width: 1144px) 100vw, 1144px\" \/><\/p>\n<p>Finally, before we proceed to the network segment of the malware, we have the code section performing the screen captures:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"37973\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/screencap\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/SCREENCAP.png\" data-orig-size=\"1380,598\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"SCREENCAP\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/SCREENCAP-300x130.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/SCREENCAP-600x260.png\" class=\"alignnone size-full wp-image-37973\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/SCREENCAP.png\" alt=\"\" width=\"1380\" height=\"598\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/SCREENCAP.png 1380w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/SCREENCAP-300x130.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/SCREENCAP-600x260.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/SCREENCAP-195x85.png 195w\" sizes=\"auto, (max-width: 1380px) 100vw, 1380px\" \/><\/p>\n<p><strong>Class 2d10104b function 1b0b685()<\/strong> is one of the main modules that branches out to do the majority of the functionality, such as looping through directories. Once all data has been gathered, the threads converge and the remaining lines of code continue single threaded. It is then that the network calls begin and all the data is sent back to the C2.<\/p>\n<h3>Panel<\/h3>\n<p>Like other stealers, Baldr comes with a panel that allows the customers (criminals that buy the product) to see high-level stats, as well as retrieve the stolen information. Below is a panel login page:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"38020\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/baldrpanel\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrpanel.png\" data-orig-size=\"707,452\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"baldrpanel\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrpanel-300x192.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrpanel-600x384.png\" class=\"alignnone size-full wp-image-38020\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrpanel.png\" alt=\"\" width=\"707\" height=\"452\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrpanel.png 707w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrpanel-300x192.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/baldrpanel-600x384.png 600w\" sizes=\"auto, (max-width: 707px) 100vw, 707px\" \/><\/p>\n<p>And here, in a screenshot posted by the threat actor on a forum, we see the inside of the panel:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"38017\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/attachment\/panel-8\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/panel.png\" data-orig-size=\"1289,599\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"panel\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/panel-300x139.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/panel-600x279.png\" class=\"alignnone size-full wp-image-38017\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/panel.png\" alt=\"\" width=\"1289\" height=\"599\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/panel.png 1289w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/panel-300x139.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/panel-600x279.png 600w\" sizes=\"auto, (max-width: 1289px) 100vw, 1289px\" \/><\/p>\n<h3>Final analysis<\/h3>\n<p>Baldr is a solid stealer that is being distributed in the wild. Its author and distributor are active in various forums to promote and defend their product against critics. During a short time span of only a few months, Baldr has gone through many versions, suggesting that its author is fixing bugs and interested in developing new features.<\/p>\n<p>Baldr will have to compete against other stealers and differentiate itself. However, the demand for such products is high, so we can expect to see many distributors use it as part of several campaigns.<\/p>\n<p>Malwarebytes users are protected against this threat, detected as Spyware.Baldr.<\/p>\n<p><em>Thanks to <a href=\"https:\/\/twitter.com\/siri_urz\" target=\"_blank\" rel=\"noopener\">S!Ri<\/a> for additional contributions.<\/em><\/p>\n<h3>Indicators of compromise<\/h3>\n<p>Baldr samples<\/p>\n<pre>5464be2fd1862f850bdb9fc5536eceafb60c49835dd112e0cd91dabef0ffcec5 -&gt; version 1.2  1cd5f152cde33906c0be3b02a88b1d5133af3c7791bcde8f33eefed3199083a6 -&gt; version 2.0  7b88d4ce3610e264648741c76101cb80fe1e5e0377ea0ee62d8eb3d0c2decb92 &gt; version 2.2  8756ad881ad157b34bce011cc5d281f85d5195da1ed3443fa0a802b57de9962f (2.2 unpacked)<\/pre>\n<p>Network traces<\/p>\n<pre id=\"magicdomid145\" class=\"ace-line\"><span class=\"author-199550989 font-color-9f3fed font-size-small\">hwid={redacted}&amp;os=Windows%207%20x64&amp;file=0&amp;cookie=0&amp;pswd=0&amp;credit=0&amp;autofill=0&amp;wallets=0&amp;id=BALDR&amp;version=v1.2.0<\/span>  <span class=\"author-199550989 font-color-9f3fed font-size-small\">hwid={redacted}&amp;os=Windows%207%20x64&amp;file=0&amp;cookie=0&amp;pswd=0&amp;credit=0&amp;autofill=0&amp;wallets=0&amp;id=BALDR&amp;version=v2.0<\/span><\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/\">Say hello to Baldr, a new stealer on the market<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Tue, 09 Apr 2019 15:00:13 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/' title='Say hello to Baldr, a new stealer on the market'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/shutterstock_550539148-2.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Baldr is a new stealer that is being actively developed and distributed. Will it be able to compete in this crowded arena?<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/criminals\/\" rel=\"category tag\">Criminals<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/baldr\/\" rel=\"tag\">Baldr<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/information-stealer\/\" rel=\"tag\">information stealer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spyware\/\" rel=\"tag\">spyware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/stealer\/\" rel=\"tag\">stealer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/stealer-functionality\/\" rel=\"tag\">stealer functionality<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/threat-analysis\/\" rel=\"tag\">threat analysis<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/unpacking-code\/\" rel=\"tag\">unpacking code<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/' title='Say hello to Baldr, a new stealer on the market'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/04\/say-hello-baldr-new-stealer-market\/\">Say hello to Baldr, a new stealer on the market<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[21510,3108,21260,10443,19665,21511,10494,21512],"class_list":["post-15050","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-baldr","tag-criminals","tag-information-stealer","tag-spyware","tag-stealer","tag-stealer-functionality","tag-threat-analysis","tag-unpacking-code"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15050"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15050\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15050"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}