General

  • Target

    Nursultan.exe

  • Size

    11.6MB

  • Sample

    240704-1d3n4sseje

  • MD5

    cab2bb07f49101514b776de08326fa1c

  • SHA1

    643c0b0e105e764051cc57371530be3bf9231e54

  • SHA256

    9060e8eef770da46598eda8d5b38f5ed66c0216cf1d34e1a6bc7c8ecc47991e5

  • SHA512

    bdf3dd0547d5ce2a08a150e8a0ad174067bd3d1b61ab300286e9769dcc65495e1d332b9da84b82a07c38e72cd715728527871bf504fbff570edda00dacb2fdfe

  • SSDEEP

    196608:AhT6sIDRuNyGLPAW0SwLRXgWPmpzdhqiMeNvX+wfm/pf+xfdiTWRZyTlKsnSrwWH:rsSjGUW05L1V8dfvX+9/pWF0CRGAsnSn

Malware Config

Targets

    • Target

      Nursultan.exe

    • Size

      11.6MB

    • MD5

      cab2bb07f49101514b776de08326fa1c

    • SHA1

      643c0b0e105e764051cc57371530be3bf9231e54

    • SHA256

      9060e8eef770da46598eda8d5b38f5ed66c0216cf1d34e1a6bc7c8ecc47991e5

    • SHA512

      bdf3dd0547d5ce2a08a150e8a0ad174067bd3d1b61ab300286e9769dcc65495e1d332b9da84b82a07c38e72cd715728527871bf504fbff570edda00dacb2fdfe

    • SSDEEP

      196608:AhT6sIDRuNyGLPAW0SwLRXgWPmpzdhqiMeNvX+wfm/pf+xfdiTWRZyTlKsnSrwWH:rsSjGUW05L1V8dfvX+9/pWF0CRGAsnSn

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks