General

  • Target

    Eulen.exe

  • Size

    10.8MB

  • Sample

    240617-yxeehswgkm

  • MD5

    62aa66c8deeabee1de033b05e40416e2

  • SHA1

    79ce62f77256f9c5469d53577c7ee0494c26c663

  • SHA256

    0597547fe49a115a6f64fc46b57f5760e1b424b0c6f2a82a13ef197a104934a6

  • SHA512

    5befe79eee87a4ff0c89c22995b1f9661e0b1cb952afe9b1220eff8bf011a97514132b6e5ba53c93a71f15487574ea9154a4bf7ea94bc3e835ae304b005347a6

  • SSDEEP

    196608:hbdDPA4mtSHeNvX+wfm/pf+xfdkR0ZWKsnarIWOzW0DaqkH:luvtSUvX+9/pWFGRiBsnarIWeRaDH

Malware Config

Targets

    • Target

      Eulen.exe

    • Size

      10.8MB

    • MD5

      62aa66c8deeabee1de033b05e40416e2

    • SHA1

      79ce62f77256f9c5469d53577c7ee0494c26c663

    • SHA256

      0597547fe49a115a6f64fc46b57f5760e1b424b0c6f2a82a13ef197a104934a6

    • SHA512

      5befe79eee87a4ff0c89c22995b1f9661e0b1cb952afe9b1220eff8bf011a97514132b6e5ba53c93a71f15487574ea9154a4bf7ea94bc3e835ae304b005347a6

    • SSDEEP

      196608:hbdDPA4mtSHeNvX+wfm/pf+xfdkR0ZWKsnarIWOzW0DaqkH:luvtSUvX+9/pWFGRiBsnarIWeRaDH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks