Blog Zscaler
Recevez les dernières mises à jour du blog de Zscaler dans votre boîte de réception
S'abonnerTechnical Analysis of Bandit Stealer
Key Takeaways
- Bandit is a new information stealer that harvests stored credentials from web browsers, FTP clients, email clients, and targets cryptocurrency wallet applications.
- The malware sends stolen information to a command and control server via Telegram.
- Bandit implements numerous methods to detect and evade virtual machines and malware sandboxes.
- Bandit has been marketed and sold as a service on underground criminal forums since April 2023.
- The malware is written using the Go programming language, which has become increasingly popular with malware developers.
Zscaler ThreatLabz has been tracking a new information stealer called Bandit Stealer that emerged in April 2023. Bandit collects sensitive information from victims' machines including cookies, saved login data, and credit card information from more than a dozen web browsers. The stealer also performs credential theft for popular FTP clients and email clients. Lastly, Bandit targets desktop cryptocurrency wallet applications. All of the stolen information is then exfiltrated back to a command and control (C2) server via Telegram. The malware is written in the Go (a.k.a. Golang) programming language and is especially notable with the large number of attempts to evade virtual environments and automated malware analysis platforms.
Bandit Stealer is marketed and sold as a service in underground cybercriminal forums as shown in Figure 1.
Figure 1: Advertisement for Bandit Stealer on an underground forum
Technical Analysis
Anti-Virtual Machine & Sandbox Identification
Bandit stealer employs a number of anti-analysis techniques to thwart automated and manual analysis. The malware uses the procfs Golang library to read information about running processes and checks for the following process names shown below:
- Xen
- Vmware
- VirtualBox
- KVM
- Sandbox
- QEMU
- jail
If a running process matches any of these names, Bandit will terminate execution.
The most recent Bandit samples also check for the presence of a debugger using the Windows API by calling IsDebuggerPresent and CheckRemoteDebuggerPresent. Bandit attempts to elevate permission using the runas command with the username set to Administrator as shown below:
C:\Windows\system32\runas.exe runas /user:Administrator C:\Users\saturn\Desktop\Bandit.exe
Bandit also executes the Windows Management Interface command-line (WMIC) utility to obtain the Universally Unique Identifier (UUID) of the victim machine and the screen dimensions using the following commands, respectively:
wmic csproduct get uuid
wmic desktopmonitor get screenheight, screenwidth
This information may help threat actors further identify analysis environments. In addition, Bandit uses an extensive list of IP addresses, MAC addresses, computer names, user names, process names to identify virtual environments and associate the environment with security vendors, and therefore avoid exhibiting any malicious behavior. The blacklist information is very similar to that of other prevalent open source stealers including Luna-Grabber, Kyoku-Cookie-Token-Stealer and Creal Stealer.
Bandit obtains the system’s external IP address from api.ipify.org and compares it with a list of blacklisted IP addresses shown in the Appendix. Some of these IP addresses belong to antivirus companies, which may be used to block signature updates.
Bandit stealer also retrieves the MAC address of the victim machine using the GetAdaptersAddresses Windows API and compares it with a blacklist shown in the Appendix. If there is a match, Bandit exits. Some of these MAC addresses are associated with virtualization software, so the purpose of the blacklist may be to evade malware sandboxes. Bandit Stealer also checks if the victim’s username and computer name are present in additional blacklists, which are obtained using “ cmd /c net session”.
The CreateToolhelp32Snapshot Windows API is used to capture the snapshot and traverse along the running process and matches with a list of blacklisted process names and terminates if any process is found executing in the memory shown in the Appendix.
Information Stealing Behavior
Bandit steals web browser data including saved login information, cookies, history, and credit card information stored in the browser’s user profile. Bandit targets a long list of browsers as shown in Table 1.
Yandex Browser |
Iridium Browser |
7Star Browser |
Vivaldi Browser |
Google Chrome |
Orbitum |
Sputnik |
uCozMedia |
Microsoft Edge |
Torch Web Browser |
Kometa Browser |
CentBrowser |
BraveSoftware |
Amigo Browser |
Epic Privacy Browser |
SeaMonkey browser |
QupZilla |
Table 1: Web browsers targeted by Bandit Stealer
The SQLite3 library is used to fetch data and the CryptUnprotectData API is used to decrypt cookies and credentials. Credit card information is also stolen, which includes the name, expiration month, year and card number.
Bandit also targets desktop cryptocurrency wallets like Electrum, Exodus, MetaMask, Guarda, Binance, Ethereum as shown in Table 2.
Coinbase wallet extension | Saturn Wallet extension |
Binance chain wallet extension | Coin98 Wallet |
TronLink Wallet | multibit Bitcoin |
Terra Station | Electron Cash |
Guildwallet extension | Electrum-btcp |
MetaMask extension | Bither Bitcoin wallet |
ronin wallet extension | multidoge coin |
Kardiachain wallet extension | LiteCoin |
Jaxx liberty Wallet | Dash Wallet |
Math Wallet extension | Ethereum |
Bitpay wallet extension | Exodus |
Nifty Wallet extension | Atomic |
Armory | Bytecoin Wallet |
Coinomi wallet | Monero wallet |
dogecoin |
Table 2: Cryptocurrency wallets targeted by Bandit Stealer
Bandit also has the capability to harvest keystrokes and steal clipboard data.
Recent samples of Bandit also target credentials in the following File Transfer Protocol Client (FTP) applications shown in Table 3.
BlazeFTP |
NovaFTP |
Staff-FTP |
EasyFTP |
DeluxeFTP |
ALFTP |
GoFTP |
32BitFtp |
Table 3: FTP client applications targeted by Bandit
Bandit also targets login information for the email clients shown in Table 4.
MailSpring |
Mailbird |
Opera Mail |
Pocomail |
Table 4: Email client applications targeted by Bandit
Stolen data is saved in various files inside a sub-folder in the %appdata%\local directory as shown in Figure 2. The sub-folder name is based on the country code and the IP address in the format [country_code][ip_address].
Figure 2: Example information collected by Bandit Stealer
The content of the USERINFO.txt contains a Bandit Stealer header followed by system information as shown in Figure 3.
Figure 3: Example content in the Bandit USERINFO.txt file
Network Communication
Bandit uses the cURL utility which is installed by default since Windows 10 v1803 to transfer data using HTTP, FTP, SMTP and more. Bandit stealer abuses pastebin.com for downloading the blacklist configuration information from a hardcoded URL as shown in Figure 4.
Figure 4: Bandit Stealer blacklist configuration downloaded from Pastebin
After Bandit finishes data collection, this information is sent to the threat actor via Telegram as shown in Figure 5.
Figure 5: Data stolen by Bandit sent to a Telegram channel
The Bandit threat actor has automated the parsing and extraction of the data and responds back with a JSON encoded structure as shown in Figure 6.
Figure 6: Example Bandit C2 response
Conclusion
Bandit Stealer is continuously updated with new features to enhance its data collection functionality. Most recently, Bandit has added support to steal FTP and email credentials. Bandit is also capable of expanding its anti-analysis features with a dynamic configuration downloaded from Pastebin. The abuse of Telegram as a C2 server has also become an increasingly popular technique to evade network-based signatures and make takedown efforts more difficult. All of these factors set up Bandit Stealer to be a potential threat for the foreseeable future.
Zscaler Coverage
Zscaler has ensured coverage for the payloads seen in these attacks via advanced threat signatures as well as Zscaler’s advanced cloud sandbox.
Figure 7: The Zscaler Cloud Sandbox successfully detected the malware
Zscaler's multilayered cloud security platform detects indicators at various levels, as shown below:
Indicators Of Compromise (IOCs)
MD5 Hash Values |
Description |
17c697da407acacadcaa8fb5c4885179 |
Bandit Stealer |
fdb111c9e0c6b1a94e2bf22131e4266d |
Bandit Stealer |
700e57847516d1f3e4ebf02e015e9f8d |
Bandit Stealer |
329562ce914d3d5998ac071333e43c1c |
Bandit Stealer |
4ab55868b65dc8f16d9d62edfd1893fa |
Bandit Stealer |
34323d65b744664567c06f8c6076a6b1 |
Bandit Stealer |
2207a896e3e2ac5dae04643e56767dcd |
Bandit Stealer |
caf4884072724f1d75a6288f27e8e8fe |
Bandit Stealer |
Appendix
IP addresses blacklisted by Bandit Stealer
88.132.231.71 |
95.25.204.90 |
34.105.72.241 |
193.128.114.45 |
78.139.8.50 |
34.145.89.174 |
109.74.154.92 |
95.25.81.24 |
20.99.160.173 |
109.74.154.90 |
213.33.142.50 |
92.211.52.62 |
88.153.199.169 |
109.145.173.169 |
109.74.154.91 |
88.132.227.238 |
84.147.62.12 |
34.141.146.114 |
93.216.75.209 |
35.199.6.13 |
194.154.78.160 |
212.119.227.151 |
192.87.28.103 |
80.211.0.97 |
92.211.109.160 |
195.239.51.59 |
88.132.226.203 |
34.85.253.170 |
195.74.76.222 |
192.40.57.234 |
195.181.175.105 |
23.128.248.46 |
188.105.91.116 |
64.124.12.162 |
88.132.225.100 |
35.229.69.227 |
34.105.183.68 |
34.142.74.220 |
92.211.192.144 |
34.138.96.23 |
92.211.55.199 |
188.105.91.173 |
34.83.46.130 |
192.211.110.74 |
79.104.209.33 |
109.74.154.91 |
188.105.91.143 |
35.237.47.12 |
178.239.165.70 |
34.141.245.25 |
34.85.243.241 |
87.166.50.213 |
34.105.0.27 |
34.145.195.58 |
193.225.193.201 |
34.253.248.228 |
35.192.93.107 |
195.239.51.3 |
84.147.54.113 |
212.119.227.167 |
MAC addresses blacklisted by Bandit Stealer
00:15:5d:00:07:34 |
00:50:56:b3:14:59 |
16:ef:22:04:af:76 |
42:01:0a:8a:00:22 |
00:e0:4c:b8:7a:58 |
ea:02:75:3c:90:9f |
00:15:5d:23:4c:ad |
00:1b:21:13:32:51 |
00:0c:29:2c:c1:21 |
00:e0:4c:44:76:54 |
1a:6c:62:60:3b:f4 |
a6:24:aa:ae:e6:12 |
00:25:90:65:39:e4 |
ac:1f:6b:d0:4d:e4 |
00:15:5d:00:00:1d |
08:00:27:45:13:10 |
c8:9f:1d:b6:58:e4 |
52:54:00:3b:78:24 |
00:50:56:a0:cd:a8 |
00:1b:21:13:26:44 |
00:25:90:36:65:0c |
00:50:56:b3:50:de |
00:50:56:b3:fa:23 |
3c:ec:ef:43:fe:de |
00:15:5d:00:00:f3 |
7e:05:a3:62:9c:4d |
52:54:00:a0:41:92 |
d4:81:d7:ed:25:54 |
2e:b8:24:4d:f7:de |
52:54:00:b3:e4:71 |
00:50:56:b3:f6:57 |
00:25:90:36:65:38 |
00:15:5d:13:6d:0c |
90:48:9a:9d:d5:24 |
00:e0:4c:56:42:97 |
00:03:47:63:8b:de |
00:50:56:a0:dd:00 |
00:50:56:b3:3b:a6 |
ca:4d:4b:ca:18:cc |
00:15:5d:00:05:8d |
00:15:5d:13:66:ca |
92:4c:a8:23:fc:2e |
f6:a5:41:31:b2:78 |
00:0c:29:52:52:50 |
56:e8:92:2e:76:0d |
5a:e2:a6:a4:44:db |
d6:03:e4:ab:77:8e |
00:50:56:b3:42:33 |
ac:1f:6b:d0:48:fe |
00:50:56:ae:6f:54 |
00:50:56:ae:b2:b0 |
3c:ec:ef:44:01:0c |
00:e0:4c:94:1f:20 |
42:01:0a:96:00:33 |
00:50:56:b3:94:cb |
06:75:91:59:3e:02 |
00:15:5d:00:05:d5 |
00:50:56:97:a1:f8 |
42:01:0a:8e:00:22 |
42:01:0a:8a:00:33 |
00:e0:4c:4b:4a:40 |
5e:86:e4:3d:0d:f6 |
00:50:56:b3:4c:bf |
ea:f6:f1:a2:33:76 |
42:01:0a:8a:00:22 |
00:50:56:b3:ea:ee |
00:50:56:b3:09:9e |
ac:1f:6b:d0:4d:98 |
00:1b:21:13:15:20 |
3e:53:81:b7:01:13 |
00:50:56:b3:38:88 |
1e:6c:34:93:68:64 |
00:15:5d:00:06:43 |
00:50:56:97:ec:f2 |
00:50:56:a0:d0:fa |
00:50:56:a0:61:aa |
00:15:5d:1e:01:c8 |
00:e0:4c:b3:5a:2a |
00:50:56:b3:91:c8 |
42:01:0a:96:00:22 |
00:50:56:b3:38:68 |
12:f8:87:ab:13:ec |
3e:c1:fd:f1:bf:71 |
00:50:56:b3:21:29 |
60:02:92:3d:f1:69 |
00:50:56:a0:38:06 |
00:50:56:a0:6d:86 |
00:15:5d:00:00:b3 |
00:e0:4c:7b:7b:86 |
2e:62:e8:47:14:49 |
00:50:56:a0:af:75 |
96:2b:e9:43:96:76 |
00:e0:4c:46:cf:01 |
00:0d:3a:d2:4f:1f |
00:50:56:b3:dd:03 |
b4:a9:5a:b1:c6:fd |
42:85:07:f4:83:d0 |
60:02:92:66:10:79 |
c2:ee:af:fd:29:21 |
d4:81:d7:87:05:ab |
56:b0:6f:ca:0a:e7 |
00:50:56:a0:d7:38 |
00:50:56:b3:ee:e1 |
ac:1f:6b:d0:49:86 |
12:1b:9e:3c:a6:2c |
be:00:e5:c5:0c:e5 |
00:50:56:a0:84:88 |
52:54:00:8b:a6:08 |
00:15:5d:00:1c:9a |
00:50:56:a0:59:10 |
00:1b:21:13:32:20 |
00:0c:29:05:d8:6e |
00:15:5d:00:1a:b9 |
00:50:56:a0:06:8d |
3c:ec:ef:44:00:d0 |
00:23:cd:ff:94:f0 |
b6:ed:9d:27:f4:fa |
00:e0:4c:cb:62:08 |
00:50:56:ae:e5:d5 |
00:e0:4c:d6:86:77 |
00:15:5d:00:01:81 |
4e:81:81:8e:22:4e |
00:50:56:97:f6:c8 |
3c:ec:ef:44:01:aa |
4e:79:c0:d9:af:c3 |
08:00:27:3a:28:73 |
52:54:00:ab:de:59 |
00:15:5d:23:4c:a3 |
00:15:5d:b6:e0:cc |
00:15:5d:00:00:c3 |
00:50:56:b3:9e:9e |
00:1b:21:13:33:55 |
00:15:5d:00:02:26 |
00:50:56:a0:45:03 |
00:50:56:a0:39:18 |
00:15:5d:00:00:a4 |
00:50:56:b3:05:b4 |
12:8a:5c:2a:65:d1 |
32:11:4d:d0:4a:9e |
00:50:56:ae:5d:ea |
1c:99:57:1c:ad:e4 |
00:25:90:36:f0:3b |
00:50:56:b3:d0:a7 |
94:de:80:de:1a:35 |
00:1b:21:13:21:26 |
Hardware IDs blacklisted by Bandit Stealer
7AB5C494-39F5-4941-9163-47F54D6D5016 |
050C3342-FADD-AEDF-EF24-C6454E1A73C9 |
BB233342-2E01-718F-D4A1-E7F69D026428 |
79AF5279-16CF-4094-9758-F88A616D81B4 |
03DE0294-0480-05DE-1A06-350700080009 |
4DC32042-E601-F329-21C1-03F27564FD6C |
9921DE3A-5C1A-DF11-9078-563412000026 |
FF577B79-782E-0A4D-8568-B35A9B7EB76B |
11111111-2222-3333-4444-555555555555 |
DEAEB8CE-A573-9F48-BD40-62ED6C223F20 |
CC5B3F62-2A04-4D2E-A46C-AA41B7050712 |
08C1E400-3C56-11EA-8000-3CECEF43FEDE |
6F3CA5EC-BEC9-4A4D-8274-11168F640058 |
05790C00-3B21-11EA-8000-3CECEF4400D0 |
00000000-0000-0000-0000-AC1F6BD04986 |
6ECEAF72-3548-476C-BD8D-73134A9182C8 |
ADEEEE9E-EF0A-6B84-B14B-B83A54AFC548 |
5EBD2E42-1DB8-78A6-0EC3-031B661D5C57 |
C249957A-AA08-4B21-933F-9271BEC63C85 |
49434D53-0200-9036-2500-369025003865 |
4C4C4544-0050-3710-8058-CAC04F59344A |
9C6D1742-046D-BC94-ED09-C36F70CC9A91 |
BE784D56-81F5-2C8D-9D4B-5AB56F05D86E |
119602E8-92F9-BD4B-8979-DA682276D385 |
00000000-0000-0000-0000-AC1F6BD04972 |
907A2A79-7116-4CB6-9FA5-E5A58C4587CD |
ACA69200-3C4C-11EA-8000-3CECEF4401AA |
12204D56-28C0-AB03-51B7-44A8B7525250 |
00000000-0000-0000-0000-000000000000 |
A9C83342-4800-0578-1EE8-BA26D2A678D2 |
3F284CA4-8BDF-489B-A273-41B44D668F6D |
921E2042-70D3-F9F1-8CBD-B398A21F89C6 |
5BD24D56-789F-8468-7CDC-CAA7222CC121 |
D7382042-00A0-A6F0-1E51-FD1BBF06CD71 |
BB64E044-87BA-C847-BC0A-C797D1A16A50 |
D8C30328-1B06-4611-8E3C-E433F4F9794E |
49434D53-0200-9065-2500-65902500E439 |
1D4D3342-D6C4-710C-98A3-9CC6571234D5 |
2E6FB594-9D55-4424-8E74-CE25A25E36B0 |
00000000-0000-0000-0000-50E5493391EF |
49434D53-0200-9036-2500-36902500F022 |
CE352E42-9339-8484-293A-BD50CDC639A5 |
42A82042-3F13-512F-5E3D-6BF4FFFD8518 |
00000000-0000-0000-0000-AC1F6BD04D98 |
777D84B3-88D1-451C-93E4-D235177420A7 |
60C83342-0A97-928D-7316-5F1080A78E72 |
38AB3342-66B0-7175-0B23-F390B3728B78 |
4CB82042-BA8F-1748-C941-363C391CA7F3 |
49434D53-0200-9036-2500-369025000C65 |
02AD9898-FA37-11EB-AC55-1D0C0A67EA8A |
48941AE9-D52F-11DF-BBDA-503734826431 |
B6464A2B-92C7-4B95-A2D0-E5410081B812 |
B1112042-52E8-E25B-3655-6A4F54155DBF |
DBCC3514-FA57-477D-9D1F-1CAF4CC92D0F |
032E02B4-0499-05C3-0806-3C0700080009 |
FA8C2042-205D-13B0-FCB5-C5CC55577A35 |
00000000-0000-0000-0000-AC1F6BD048FE |
FED63342-E0D6-C669-D53F-253D696D74DA |
DD9C3342-FB80-9A31-EB04-5794E5AE2B4C |
C6B32042-4EC3-6FDF-C725-6F63914DA7C7 |
EB16924B-FB6D-4FA1-8666-17B91F62FB37 |
2DD1B176-C043-49A4-830F-C623FFB88F3C |
E08DE9AA-C704-4261-B32D-57B2A3993518 |
FCE23342-91F1-EAFC-BA97-5AAE4509E173 |
A15A930C-8251-9645-AF63-E45AD728C20C |
4729AEB0-FC07-11E3-9673-CE39E79C8A00 |
07E42E42-F43D-3E1C-1C6B-9C7AC120F3B9 |
CF1BE00F-4AAF-455E-8DCD-B5B09B6BFA8F |
67E595EB-54AC-4FF0-B5E3-3DA7C7B547E3 |
84FE3342-6C67-5FC6-5639-9B3CA3D775A1 |
88DC3342-12E6-7D62-B0AE-C80E578E7B07 |
365B4000-3B25-11EA-8000-3CECEF44010C |
C7D23342-A5D4-68A1-59AC-CF40F735B363 |
DBC22E42-59F7-1329-D9F2-E78A2EE5BD0D |
5E3E7FE0-2636-4CB7-84F5-8D2650FFEC0E |
63FA3342-31C7-4E8E-8089-DAFF6CE5E967 |
63203342-0EB0-AA1A-4DF5-3FB37DBB0670 |
CEFC836C-8CB1-45A6-ADD7-209085EE2A57 |
96BB3342-6335-0FA8-BA29-E1BA5D8FEFBE |
8DA62042-8B59-B4E3-D232-38B29A10964A |
44B94D56-65AB-DC02-86A0-98143A7423BF |
A7721742-BE24-8A1C-B859-D7F8251A83D3 |
0934E336-72E4-4E6A-B3E5-383BD8E938C3 |
3A9F3342-D1F2-DF37-68AE-C10F60BFB462 |
6608003F-ECE4-494E-B07E-1C4615D1D93C |
3F3C58D1-B4F2-4019-B2A2-2A500E96AF2E |
12EE3342-87A2-32DE-A390-4C2DA4D512E9 |
F5744000-3C78-11EA-8000-3CECEF43FEFE |
D9142042-8F51-5EFF-D5F8-EE9AE3D1602A |
D2DC3342-396C-6737-A8F6-0C6673C1DE08 |
38813342-D7D0-DFC8-C56F-7FC9DFE5C972 |
AF1B2042-4B90-0000-A4E4-632A1C8C7EB1 |
49434D53-0200-9036-2500-369025003AF0 |
EADD1742-4807-00A0-F92E-CCD933E9D8C1 |
FE455D1A-BE27-4BA4-96C8-967A6D3A9661 |
4D4DDC94-E06C-44F4-95FE-33A1ADA5AC27 |
8B4E8278-525C-7343-B825-280AEBCD3BCB |
Usernames blacklisted by Bandit Stealer
WDAGUtilityAccount |
server |
8VizSM |
Abby |
BvJChRPnsxn |
w0fjuOVmCcP5A |
hmarc |
Harry Johnson |
lmVwjj9b |
patex |
SqgFOf3G |
PqONjHVwexsS |
RDhJ0CNFevzX |
Lucas |
3u2v9m8 |
kEecfMwgj |
mike |
Julia |
Frank |
PateX |
HEUeRzl |
8Nl0ColNQ5bq |
h7dk1xPr |
fred |
Lisa |
Louise |
RGzcBUyrznReg |
John |
User01 |
PxmdUOpVyx |
george |
test |
Computer names blacklisted by Bandit Stealer
BEE7370C-8C0C-4 |
WILEYPC |
DESKTOP-CBGPFEE |
DESKTOP-NAKFFMT |
WORK |
SERVER-PC |
WIN-5E07COS9ALR |
6C4E733F-C2D9-4 |
TIQIYLA9TW5M |
B30F0242-1C6A-4 |
RALPHS-PC |
DESKTOP-KALVINO |
DESKTOP-VRSQLAG |
DESKTOP-WG3MYJS |
COMPNAME_4047 |
Q9IATRKPRH |
DESKTOP-7XC6GEZ |
DESKTOP-19OLLTD |
XC64ZB |
DESKTOP-5OV9S0O |
DESKTOP-DE369SE |
DESKTOP-D019GDM |
QarZhrdBpj |
EA8C2E2A-D017-4 |
DESKTOP-WI8CLET |
ORELEEPC |
AIDANPC |
SERVER1 |
ARCHIBALDPC |
LUCAS-PC |
LISA-PC |
JULIA-PC |
MARCI-PC |
JOHN-PC |
d1bnJkfVlH |
DESKTOP-1PYKP29 |
DESKTOP-B0T93D6 |
NETTYPC |
DESKTOP-1Y2433R |
DESKTOP-BUGIO |
Process names blacklisted by Bandit Stealer
httpdebuggerui |
vmwareuser |
wireshark |
vgauthservice |
fiddler |
vmacthlp |
regedit |
x96dbg |
cmd |
vmsrvc |
taskmgr |
x32dbg |
vboxservice |
vmusrvc |
df5serv |
prl_cc |
processhacker |
prl_tools |
vboxtray |
xenservice |
vmtoolsd |
qemu-ga |
vmwaretray |
joeboxcontrol |
ida64 |
ksdumperclient |
ollydbg |
ksdumper |
pestudio |
joeboxserver |
Cet article a-t-il été utile ?
Recevez les dernières mises à jour du blog de Zscaler dans votre boîte de réception
En envoyant le formulaire, vous acceptez notre politique de confidentialité.