General

  • Target

    Electron_V3.rar

  • Size

    9.2MB

  • Sample

    240611-l4vc4ashja

  • MD5

    57c67a45d8337a6e28a4a76d41428137

  • SHA1

    a2d30fb658e0e22db2b7589a3f57600f890d49df

  • SHA256

    00a1d4c5aed5320d9d225b4f23b567dec0b6a208ae0114150f6d8209be2fd252

  • SHA512

    6826c8ab3d02a30cf37270d23cf5375beed38a1a19ec8334084a5cbbac0b6c4b81cfb39a5fcb94929743784df08cce012a6000808f314694bf9ffc0d7824c42b

  • SSDEEP

    196608:z3j0MFirWtc9Espk4nM4x1afRMZii+fgW7nLyhz7hn2rRyozEB6OLlkrXJc:z3rVYEspzx14Rs+fgWShXh2rkozIPLlL

Malware Config

Targets

    • Target

      Electron_V3.rar

    • Size

      9.2MB

    • MD5

      57c67a45d8337a6e28a4a76d41428137

    • SHA1

      a2d30fb658e0e22db2b7589a3f57600f890d49df

    • SHA256

      00a1d4c5aed5320d9d225b4f23b567dec0b6a208ae0114150f6d8209be2fd252

    • SHA512

      6826c8ab3d02a30cf37270d23cf5375beed38a1a19ec8334084a5cbbac0b6c4b81cfb39a5fcb94929743784df08cce012a6000808f314694bf9ffc0d7824c42b

    • SSDEEP

      196608:z3j0MFirWtc9Espk4nM4x1afRMZii+fgW7nLyhz7hn2rRyozEB6OLlkrXJc:z3rVYEspzx14Rs+fgWShXh2rkozIPLlL

    Score
    3/10
    • Target

      Electron V3/ElectronV3.exe

    • Size

      24.3MB

    • MD5

      e891973adb4e3a6edc9738b84e382be1

    • SHA1

      bab0eb519e90590a96599a52d14acf9041bcad2e

    • SHA256

      0e3daf09ae8042d432ce7aff2544762024590ac89bd6753f27fbf9fdce478b7f

    • SHA512

      4db3ac8856479698ab9513576d008d54f111355f437299f3b7254d8e70db5228e2d9f3cd7318c578f27009493539663c56a889647bb1de9c35ebb2e7c71713f9

    • SSDEEP

      196608:tO6xCmDAJediqShxWTMRHvUWvo3hxjno/w3iFCxHQbRpXpPr+5Py:cmShATMRHdgxro/w3uCxHQbZPY

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      Stub.pyc

    • Size

      799KB

    • MD5

      b83723d9ba3e5e2b477debe68a742f44

    • SHA1

      95ccea42491d08d975a7f93ce155bc3fd5649555

    • SHA256

      60e8697cfca7d2553b72d866e7e2b606e85148b91f340545ddec23d3fbffcc24

    • SHA512

      1e9c19f28b053274312354dea5feadacbfdc5ca0863f3e920939fd2bd947df5e0c5d320cfeaf4fe295334048c3f3a28607973887fef6a9ab11323d4a310209ae

    • SSDEEP

      12288:fNMfhPLKX/8JW9tZzzYy7JwZEs7Fm5Fr/mWZ71sWS7rnB+xJCRjI6kkZwyyehL:68XWWjZzzBuR+F7RgWSXBAKEk6EL

    Score
    3/10
    • Target

      Electron V3/bin/agree.txt

    • Size

      4B

    • MD5

      b326b5062b2f0e69046810717534cb09

    • SHA1

      5ffe533b830f08a0326348a9160afafc8ada44db

    • SHA256

      b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b

    • SHA512

      9120cd5faef07a08e971ff024a3fcbea1e3a6b44142a6d82ca28c6c42e4f852595bcf53d81d776f10541045abdb7c37950629415d0dc66c8d86c64a5606d32de

    Score
    3/10
    • Target

      Electron V3/scripts/Inf Yield.txt

    • Size

      98B

    • MD5

      727b09f7da97df9cf7eb1bbe0eb19fed

    • SHA1

      24b31b8e25757f0b3c94c143435fcbd084eb3c52

    • SHA256

      eabc284aad668b0911ea92fea5b0fcd2803fbfdf651b5fa0b4cf5e0b63544a12

    • SHA512

      af379acccefb60b1ca465076469c57d09f846467b94f4ae500dcaf0c69e4418d2bf5cac3af89ad3e177291ce1d63d0649f34bc5ebeec714b66d98b365901360e

    Score
    3/10
    • Target

      Electron V3/workspace/IY_FE.iy

    • Size

      539B

    • MD5

      291d5636a434c4f1ceb0f3f776c2a51f

    • SHA1

      ae287e08f71c522a72812f0dace94b8ffb569341

    • SHA256

      73bb58ba5b81960caf5a8e66675cc89b5761b77db99c6ceb9435f7211d400452

    • SHA512

      7dab8034f85aef1b2b7a86cc8220ebdbb95a3f083d1565e1cff38414367aa69fc597a11aaba11dbef411e13fbfb285855d9c46ae59738f6e88c22dd55c81a743

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks