Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

Braodo Stealer (Infostealer) – Malware

January 30, 2025
Reading Time: 4 mins read
in Malware
Braodo Stealer (Infostealer) – Malware

Braodo Stealer

Type of Malware

Infostealer

Country of Origin

Vietnam

Targeted Countries

Vietnam
United States
Czech Republic
Germany
Netherlands
Singapore
United Kingdom

Date of initial activity

2024

Motivation

Data Theft

Attack Vectors

Phishing

Targeted Systems

Windows

Type of information Stolen

Login Credentials

Overview

The emergence of advanced malware threats continues to challenge cybersecurity measures across the globe, with Braodo Stealer standing out as a particularly sophisticated and dangerous variant. First identified in early 2024, Braodo Stealer is a Python-based information stealer primarily targeting users in Vietnam, although its reach extends to numerous countries, including the United States, the Czech Republic, Germany, the Netherlands, Singapore, and the United Kingdom. This malware exemplifies the evolving tactics of cybercriminals, leveraging phishing and spear-phishing techniques to compromise victims and exfiltrate sensitive information. What sets Braodo Stealer apart is its utilization of modern technologies for both distribution and data collection. The malware exploits platforms like GitHub and a Singapore-based Virtual Private Server (VPS) to host its malicious code, indicating a well-structured operational approach by the threat actors behind it. The VPS infrastructure is particularly noteworthy, as it has previously hosted websites mimicking Vietnamese government sites, highlighting a possible attempt to build trust and increase the effectiveness of the malware’s deployment. This strategic choice not only facilitates the distribution of the malware but also underscores the sophisticated planning involved in its development.

Targets

Individuals

How they operate

Infiltration and Delivery Mechanisms
Braodo Stealer primarily spreads through phishing and spear-phishing emails, leveraging social engineering tactics to trick users into executing malicious files. The malware is hosted on multiple GitHub repositories, with a notable reliance on a Singapore-based Virtual Private Server (VPS). This infrastructure not only serves to distribute the malware but also to obfuscate its origin, making detection more challenging for security systems. The phishing attempts often contain batch scripts, PowerShell commands, or executable files, which, once executed, initiate the malware’s payload. Upon execution, Braodo Stealer downloads a second-stage payload hosted on GitHub. The initial downloader scripts, often obfuscated, reveal additional servers associated with the threat actors. Once the malicious code is executed, it triggers a series of commands that ensure the malware establishes persistence by adding itself to the Windows Startup folder. This persistence mechanism guarantees that the malware remains active even after system reboots.
Data Exfiltration Techniques
One of the most concerning aspects of Braodo Stealer is its ability to collect a wide range of sensitive data. The malware specifically targets web browsers, including Chrome, Firefox, Edge, and others, to extract stored credentials, cookies, and other sensitive information. Once the malware identifies the browser data, it uses a multi-threaded approach to execute various functions concurrently, ensuring efficient data collection from multiple browsers. The collected data is then compressed and exfiltrated through Telegram bots, a method that helps mask the communication channels from traditional security monitoring tools. The use of Telegram for data exfiltration not only facilitates real-time transmission but also enhances anonymity, making it more difficult for investigators to trace the data back to the threat actors.
Obfuscation and Evasion Techniques
To evade detection by antivirus solutions and security frameworks, Braodo Stealer employs advanced obfuscation techniques. The malware’s scripts often appear as gibberish when analyzed, due to the insertion of specific byte sequences that alter their representation in the operating system. By obscuring the original content, Braodo Stealer increases the difficulty of detection, allowing it to operate undetected for extended periods. Moreover, the malware employs a mechanism that dumps all running processes into a text file, which aids in monitoring system activity and evading suspicious behaviors that could alert security measures. This operational stealth is a hallmark of modern malware, as threat actors continuously refine their strategies to counteract cybersecurity defenses.
Conclusion
The technical operations of Braodo Stealer highlight a growing trend in cybercrime: the use of sophisticated, multi-layered approaches to execute and sustain malware attacks. By leveraging obfuscation, data exfiltration via Telegram, and the manipulation of phishing tactics, Braodo Stealer poses a significant threat to individual users and organizations alike. As such, it is imperative for users to adopt vigilant cybersecurity practices, including awareness of phishing attempts, regular software updates, and robust password management, to defend against such evolving threats. The implications of Braodo Stealer’s operational tactics underscore the importance of continued research and development in the field of cybersecurity to mitigate the risks posed by advanced malware.

MITRE Tactics and Techniques

Execution (TA0002)
T1059: Command and Scripting Interpreter T1064: Scripting
Persistence (TA003)
T1547.001: Startup Folder
Credential Access (TA006)
T1555.003: Credentials from Web Browsers T1606.001: Web Cookies
Discovery (TA007)
T1057: Process Discovery T1083: File and Directory Discovery
Collection (TA009)
T1005: Data from Local System
Exfiltration (TA0010)
T1041: Exfiltration Over C2 Channel
Command and Control (TA0011)
T1071.001: Web Protocols  
References:
  • Braodo Info Stealer Targeting Vietnam and Abroad
Tags: Braodo StealerCzech RepublicFacebookGermanyGitHubInfostealersMalwareNetherlandsSingaporeUnited KingdomUnited StatesVietnam
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

Linux Core Dump Flaws Risk Password Leaks

GitHub Code Flaw Replicated By AI Models

Google Script Used In New Phishing Scams

EDDIESTEALER Uses Fake CAPTCHAs for Stealing

Fake AI Apps Drop Ransomware And Malware

OneDrive Flaw Gives Sites Full Data Access

Subscribe to our newsletter

    Latest Incidents

    Covenant Health Cyberattack Shuts Hospitals

    Moscow DDoS Attack Cuts Internet For Days

    Puerto Rico’s Justice Department Cyberattack

    State Actors Hit ConnectWise ScreenConnect

    Ivanti Flaw Hits NHS Staff and Patient Data

    Amalgamated Sugar Data Breach Exposes SSNs

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial