General

  • Target

    SteamASF.exe

  • Size

    12.3MB

  • Sample

    240701-ke9aaavejk

  • MD5

    aba8c750be03dbfb6e6e70d138799cb1

  • SHA1

    287faafd0867ba0700bb2e98066a9f4d3fd28b84

  • SHA256

    8755f68eccf19add73afec66f09c565778738f79b161feb588ec5d203a7ee0e5

  • SHA512

    2aa53bf730b7bb7f331bda9b8095f16403bf6cb93915562e2a8872ccdab5bd3597e89d23997f9504edaa7c2cc6102649390241d1b343158b85469bcf63be57dc

  • SSDEEP

    393216:4zulpV5L1V8dvOg56L+9/pWFGRiBsnOrIWeRaDH:4alpLROOg56L+9/pWHGhRq

Malware Config

Targets

    • Target

      SteamASF.exe

    • Size

      12.3MB

    • MD5

      aba8c750be03dbfb6e6e70d138799cb1

    • SHA1

      287faafd0867ba0700bb2e98066a9f4d3fd28b84

    • SHA256

      8755f68eccf19add73afec66f09c565778738f79b161feb588ec5d203a7ee0e5

    • SHA512

      2aa53bf730b7bb7f331bda9b8095f16403bf6cb93915562e2a8872ccdab5bd3597e89d23997f9504edaa7c2cc6102649390241d1b343158b85469bcf63be57dc

    • SSDEEP

      393216:4zulpV5L1V8dvOg56L+9/pWFGRiBsnOrIWeRaDH:4alpLROOg56L+9/pWHGhRq

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks