Infostealer Logs Analysis Report

Infostealer Logs Analysis Report

Notice

 

 

The Infostealer Logs analysis report is a report that analyzes various Infostealer logs (RedLine, Raccoon, Vidar, Meta, etc.) collected from the deep and dark web including Telegram. Please note that the source and content of the report cannot be verified in part.

Infostealer Logs Analysis Report

 

Introduction

 

 

The purpose of this report is to provide a comprehensive insight into the cyber threat environment by conducting a deep analysis of the log data stolen by Infostealer malware. Unlike other reports that cover the analysis and trends of Infostealer malware, this report is based on the data of the actual infected systems to derive threat actors’ strategies, types of damages, and effective response measures. This report also analyzed 28,248,895 infection cases worldwide to identify the characteristics and patterns by region, system, and user type.

 

 

 

 1) Data Overview

 

 

This report analyzes the Top 30 items among 9 key data fields extracted from the log files collected by Infostealer malware from August to October 2024 (RedLine – UserInfomation.txt, Raccoon – System Info.txt, Vidar – information.txt, etc.). While the entire log file contains more information, the Top 30 data items from the 9 key datasets were selected as the analysis target to clearly identify the threat actor’s strategies, the patterns of damages, and the effective response measures.

 

 

 

Data

Description

attack_build_id Build identifier of the malware
attack_file_path Process injected by malware and copied file path
victim_pc_av Targets PC anti-virus information
victim_pc_country Nationality of the target
victim_pc_location Detailed location (city) of the target
victim_pc_machinename Name of the affected PC
os_name Operating system information of the target PC
user_type User type (individual/company)
victim_pc_username Victim’s username

Table 1. Datasets used in the analysis

 

 

The Top 30 data for each dataset are the items that show the highest frequency in each field and can represent the main patterns and trends of the entire data. Through this data selection, the main features of the logs and the damage patterns caused by Infostealer malware have become even clearer. Although only a portion of the entire dataset was analyzed, it was deemed to have sufficient statistical significance to derive the trends and countermeasures against Infostealer malware over the past three months.

 

 

 

1) Main Analysis Results

 

 

 

(1) Attacker Profiling

 

 

According to the analysis of the attack_build_id, the Top 3 builds are ‘@mach***’ (2,294,689 posts), ‘@+uuz8-qluneu2***’ (1,687,579 posts), and ‘russia ***’ (1,215,748 posts). It is worth noting that a significant number of build IDs include the name or ID of a Telegram channel. This suggests that threat actors are using Telegram as a means to track and manage their activities.

 

Threat actors can be broadly categorized into Russian-speaking groups (“russia ***”, “@dmitriylo***”), Cloud-based groups (“@watercloud_ad***”, “@prdscloud_m***”), and Independent groups (“@mach***”, “@sup_n***”).

 

 


Figure 1. Top 10 threat actor build IDs of InfoStealer malware

 

(2) Analysis of Targeted Processes and Infection Paths

 

 

Through the analysis of the attack_file_path, the distribution of the main target paths (injection and copying itself) was identified. .NET Framework-related paths accounted for the highest proportion at 68.2%, followed by Windows system paths (21.5%), user temporary folders (8.7%), and others (1.6%). In particular, legitimate system files such as regasm.exe (44.3%), bitlockertogo.exe (13.8%), and msbuild.exe (9.2%) were mainly exploited as target processes for injection. For more information, refer to 4) In-Depth Analysis and Insights – (2) Patterns of Exploiting Injection in Legitimate Processes.