Overview
overview
8Static
static
8Exploit-St...obf.py
windows7-x64
3Exploit-St...obf.py
windows10-2004-x64
3Exploit-St...px.exe
windows7-x64
7Exploit-St...px.exe
windows10-2004-x64
7Exploit-St...ld.bat
windows7-x64
1Exploit-St...ld.bat
windows10-2004-x64
1Exploit-St...dex.py
windows7-x64
3Exploit-St...dex.py
windows10-2004-x64
3Exploit-St...on.bat
windows7-x64
1Exploit-St...on.bat
windows10-2004-x64
8Exploit-St...ain.py
windows7-x64
3Exploit-St...ain.py
windows10-2004-x64
3Behavioral task
behavioral1
Sample
Exploit-Stealer/Obfuscator/obf.py
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Exploit-Stealer/Obfuscator/obf.py
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Exploit-Stealer/UPX/upx.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Exploit-Stealer/UPX/upx.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
Exploit-Stealer/build.bat
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Exploit-Stealer/build.bat
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
Exploit-Stealer/index.py
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Exploit-Stealer/index.py
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Exploit-Stealer/install_python.bat
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
Exploit-Stealer/install_python.bat
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
Exploit-Stealer/main.py
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
Exploit-Stealer/main.py
Resource
win10v2004-20231215-en
General
-
Target
Exploit-Stealer.zip
-
Size
576KB
-
MD5
714dc505a33e5f9056af3f77355a1a82
-
SHA1
8477928bad280cca1435cb3943d8c823fc22c929
-
SHA256
dd72d8d539128b02d88b7ec4527531008d89b9fadf1cfd454ed7f289a141bcb4
-
SHA512
574c43bf7d76b04c15997e3610ff3b78b458a247bdfbb246c03c43f5a2a70b1a1a9782c8abcaafa56a006995703231062cda4899d282c872f3a8c2beda684520
-
SSDEEP
12288:nnODwN9Vgu/0L3eSgKd9slWY7b9uwJrj6d94UFYLH5hHNZO6KsxxuQj7Okwn5DW:noqgusLOP62lWmxPN2d94UmLH/HNtJuU
Malware Config
Signatures
-
Patched UPX-packed file 1 IoCs
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
resource yara_rule static1/unpack002/out.upx patched_upx -
resource yara_rule static1/unpack001/Exploit-Stealer/UPX/upx.exe upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/Exploit-Stealer/UPX/upx.exe unpack002/out.upx
Files
-
Exploit-Stealer.zip.zip
Password: hello
-
Exploit-Stealer/AssemblyFile/version.txt
-
Exploit-Stealer/How To Use.txt
-
Exploit-Stealer/Obfuscator/obf.py
-
Exploit-Stealer/UPX/upx.exe.exe windows:4 windows x64 arch:x64
Password: hello
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 548KB - Virtual size: 548KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x64 arch:x64
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
.text Size: 897KB - Virtual size: 896KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 12KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
Exploit-Stealer/UPX/what is upx.exe.txt
-
Exploit-Stealer/build.bat
-
Exploit-Stealer/index.py
-
Exploit-Stealer/install_python.bat.bat .ps1
-
Exploit-Stealer/main.py