SVG Phishing hits Ukraine with Amatera Stealer, PureMiner

A phishing campaign targeting Ukrainian government entities uses malicious SVG files to initiate an infection chain. The attack begins with emails containing SVG attachments that redirect victims to a download site. A CHM file is then used to execute a remote HTA loader, which delivers two malware payloads: Amatera Stealer and PureMiner. Amatera Stealer harvests extensive information from infected systems, including credentials, system data, application data, browser files, and cryptocurrency wallets. PureMiner collects hardware information and monitors system activity to deploy efficient CPU or GPU mining modules. The campaign demonstrates sophisticated techniques, including fileless malware delivery and the use of multiple stages to evade detection. Author: AlienVault

Related Tags:
CountLoader

PureMiner

Amatera Stealer

T1218.001

svg

chm

T1059.007

data theft

fileless

Associated Indicators:
B8FB772D92A74DCD910AC125EAD1C50CE5834B76F58E7F107BB1E16B8C16ADBB

BF9E6BEE654831B91E891473123BBD9BC7FF3450471E653C7045F5BD8477D7A1

9D2A88F7F4D6925E654EE3EDCD334EB9496A279EE0C40F7B14405B35500EBF99

2BD4DF59071409AF58D0253202B058A6B1F1206663236DEA5163E7C30A055F21

61FEE7E2012919FAFC3B47B37753FF934F7A0CA2A567DCA5F15D45AB55AE2211

27C9C4E200815A9F474126AFA05D4266BC55AAFA9DF0681A333267E4BBD101DE

C25E4BD9E8D49F3BEEF37377414028B07986DACCE5551F96038B930FAF887ACC

C62FE8D6C39142C7D8575BD50E6F2FCD9F92C4F0A1A01411D0F3756A09FD78A7

7DEB9E6398C92CF01502F32A78C16F55354DCF3D2B062918F6651852742BC7CD