RootTeam
Taking a look at this free GO stealer
Overview
Identified by @g0njxa, RootTeam is a GO stealer that can be built via a Telegram channel https[:]//t[.]me/rootteam_bot
. It has been confused with Bandit Stealer another GO stealer with similar functionality.
The sample we are triaging came from @James_inthe_box twitter post with a link to the sample on AnyRun
References
- RootTeam Stealer and overlap issues on Bandit Stealer rule detection
- Technical Analysis of Bandit Stealer
- RootTeam builder exposed on twitter
- New Info Stealer Bandit Stealer Targets Browsers, Wallets
- Yogesh Londhe tweet about the stealer
- GO IDA parser (works well!)
Sample
The sample is being delived via this url https[:]//telegra[.]ph/Dead-Space-Remake-PC-Download-For-Free-07-07
AnyRun
Delivery
Stage 1 - Setup.zip
The sample poses as free software and is delivered via a password encrypted ZIP file. The password provided is 2023
. To infect themselves the victim must first download the sample then unzip it using the provided password and then launch the unzipped Setup.exe
file.
-
Setup.zip
88a44f77d9216b4c285329f5f13bcd948bca61e1b9bb4dafb541cc6ea68ce311
-
Setup.exe
9de0dfcf9baf669811374d2f6ed0a1182df8d0254cd210f6f2883c659014de5a
Malshare
Stage 2 - Shellcode
The Setup.exe
PE file has a resource named OUTPUT_BIN
that contains shellcode and the encrypted stealer payload. The shellcode has 2 stages. The first is a simple obfuscation function that decrypts the second stage. The second stage is an XOR decryption loop the decrypts the final payload.
UPX Payload
The decrypted payload is also UPX packed. Once unpacked the final RootTeam stealer is revealed.
Analysis
e0cd16b3de1f8b6c91b3483e383199f691e935d3d4e1ed9e77f6f9aea929b68b
The stealer method names and strings can be recovered using the IDA GO tool go_parser. Once recovered the functionally of the stealer can be determined based on the stealer function names prefixed by RootTeamStl_
. The strings are in plaintext including the C2 URLs.
http[:]//5.42.66[.]26/api/report
http[:]//5.42.66[.]26/upload/