General

  • Target

    Nursultan Alpha.exe

  • Size

    19.6MB

  • Sample

    240715-yhj2fsyfjc

  • MD5

    d3f611136dd32753021838c58644113a

  • SHA1

    9dd7f106c0d59b6f3f299980ba9c5bddfbd56671

  • SHA256

    11df8182358b1cc5162d910721247864b70d4bc44a3bfddbf3cb8a5aa801b6f0

  • SHA512

    dd08b97d2c37c5c790a4bd2bca0d2fb4f91a8ca9c9c3d823778ec727df89dbba3b6c110ef5c401dc6957025a5e4857cf7e7f81f1e8cfb1929283203e8b2b056a

  • SSDEEP

    196608:hjf091nWq7n0jc/bPeNrYFJMIDJ+gsAGKpRTb5y+6q88uO:KLl7n0jcw8Fqy+gsiJM

Malware Config

Targets

    • Target

      Nursultan Alpha.exe

    • Size

      19.6MB

    • MD5

      d3f611136dd32753021838c58644113a

    • SHA1

      9dd7f106c0d59b6f3f299980ba9c5bddfbd56671

    • SHA256

      11df8182358b1cc5162d910721247864b70d4bc44a3bfddbf3cb8a5aa801b6f0

    • SHA512

      dd08b97d2c37c5c790a4bd2bca0d2fb4f91a8ca9c9c3d823778ec727df89dbba3b6c110ef5c401dc6957025a5e4857cf7e7f81f1e8cfb1929283203e8b2b056a

    • SSDEEP

      196608:hjf091nWq7n0jc/bPeNrYFJMIDJ+gsAGKpRTb5y+6q88uO:KLl7n0jcw8Fqy+gsiJM

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks