Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Malware

S0373

Astaroth

Type

Trojan (downloader and infostealer)

Associated threat actors

Various

Key Capabilities

Harvests sensitive data like credentials and system information using evasion techniques, multi-stage infection, and persistence mechanisms.

OS Targeted

Windows

IoCs on Maltiverse

Maltiverse provides updated IoCs for easy SIEM/SOAR/Firewall/EDR integration.

What is Astaroth?

Astaroth (S0373) is a Trojan that acts as both a downloader and an infostealer. It is known for its sophisticated evasion methods, such as code obfuscation and anti-analysis checks, which make it difficult for security tools to detect.

Astaroth malware uses a multi-stage infection process to download payloads that harvest sensitive data, like system credentials. Its persistence mechanisms ensure it remains active even after a reboot.

How to Defend Against Astaroth?

Defending against Astaroth malware requires detecting its evasive techniques and blocking its multi-stage infection process.

  • Implement robust email filtering to intercept malicious attachments that serve as the initial infection vector.
  • Keep systems and software patched to reduce the vulnerabilities exploited during its infection chain.
  • Deploy endpoint detection and antivirus to identify and block the malware’s execution, even with code obfuscation.
  • Use network detection (NDR) and integrated threat intelligence from a platform like Lumu Maltiverse to block its C2 communications and payload downloads.
  • Use network segmentation to limit the impact of a breach and prevent Astaroth malware from spreading laterally.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.