A Deep Dive Into the APT28’s stealer called CredoMap
Common Information
Type Value
UUID d63373f5-7520-4290-905e-611349154bdf
Fingerprint ac159d9ae8382aaf
Analysis status DONE
Considered CTI value 2
Text language
Published Dec. 27, 2022, midnight
Added to db Jan. 16, 2023, 3:54 p.m.
Last updated Nov. 18, 2024, 1:38 a.m.
Headline A Deep Dive Into the APT28’s stealer called CredoMap
Title A Deep Dive Into the APT28’s stealer called CredoMap
Detected Hints/Tags/Attributes 39/2/15
Attributes
Details Type #Events CTI Value
Details CVE 172
cve-2022-30190
Details File 1
gcmblockcipher.ini
Details File 60
cookies.sql
Details File 64
logins.json
Details File 41
key4.db
Details File 12
cert9.db
Details File 24
signons.sql
Details File 36
key3.db
Details File 10
cert8.db
Details File 25
interop.dll
Details File 2127
cmd.exe
Details sha256 3
2318ae5d7c23bf186b88abecf892e23ce199381b22c8eb216ad1616ee8877933
Details IPv4 3
162.241.216.236
Details Threat Actor Identifier - APT 783
APT28
Details Yara rule 1
rule CredoMap_APT28 {
	meta:
		author = "Vlad Pasca - SecurityScorecard"
		Date = "2022-09-16"
	strings:
		$s1 = "\\cookies.sqlite" wide fullword
		$s2 = "SQLite.Interop.dll" wide fullword
		$s3 = "Subject:" wide fullword
		$s4 = "$ LOGIN" wide fullword
		$s5 = "/C Del" wide fullword
	condition:
		(uint16(0) == 0x5A4D) and (4 of ($s*))
}