General

  • Target

    AudioDriver.exe

  • Size

    12.3MB

  • Sample

    240701-s7hl2axhra

  • MD5

    71232894c1efa044ca741ed326350f8a

  • SHA1

    30244ec5e944f4e2603c867087091a1743a205e6

  • SHA256

    5886a194c1b918d1d88f780cd973e66b93ddc0e906203ce814148a28affffca9

  • SHA512

    63400d2d5231c731fcee0ed16e931743c5a7831bc379018ceed941a03b8458a45fb3510bd4397094a3d0e6678131cfc24a03afe3ce5c7be13f4b7dfdc36ddb96

  • SSDEEP

    393216:QV5L1V8dvOg56L+9/pWFGRiBsnOrIWeRaDH:QLROOg56L+9/pWHGhRq

Malware Config

Targets

    • Target

      AudioDriver.exe

    • Size

      12.3MB

    • MD5

      71232894c1efa044ca741ed326350f8a

    • SHA1

      30244ec5e944f4e2603c867087091a1743a205e6

    • SHA256

      5886a194c1b918d1d88f780cd973e66b93ddc0e906203ce814148a28affffca9

    • SHA512

      63400d2d5231c731fcee0ed16e931743c5a7831bc379018ceed941a03b8458a45fb3510bd4397094a3d0e6678131cfc24a03afe3ce5c7be13f4b7dfdc36ddb96

    • SSDEEP

      393216:QV5L1V8dvOg56L+9/pWFGRiBsnOrIWeRaDH:QLROOg56L+9/pWHGhRq

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks