General

  • Target

    searcheX.exe

  • Size

    17.8MB

  • Sample

    240619-z2fzkswenl

  • MD5

    9045e9dcc96c7051996f2b2ea7a6f218

  • SHA1

    8a03c566f65796b21c158ff0d8414ac27396661d

  • SHA256

    2672460ef552f40e1644c73d44393066206768c2a60f01d94bd028f690496691

  • SHA512

    493dbf43459979fb760b03e3de14a1e74a86590af450813458d9b94d507e316bcb10244fb41a480516df96804b2c2bb889c5a134dc4e2686860d950b6d44c0ee

  • SSDEEP

    196608:2h5hl8PAzmtSHeNvX+wfm/pf+xfdkRTIe7TX4U/UtOVxQ0/72MF:81StSUvX+9/pWFGRMoTX4U8tsz7DF

Malware Config

Targets

    • Target

      searcheX.exe

    • Size

      17.8MB

    • MD5

      9045e9dcc96c7051996f2b2ea7a6f218

    • SHA1

      8a03c566f65796b21c158ff0d8414ac27396661d

    • SHA256

      2672460ef552f40e1644c73d44393066206768c2a60f01d94bd028f690496691

    • SHA512

      493dbf43459979fb760b03e3de14a1e74a86590af450813458d9b94d507e316bcb10244fb41a480516df96804b2c2bb889c5a134dc4e2686860d950b6d44c0ee

    • SSDEEP

      196608:2h5hl8PAzmtSHeNvX+wfm/pf+xfdkRTIe7TX4U/UtOVxQ0/72MF:81StSUvX+9/pWFGRMoTX4U8tsz7DF

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks