General

  • Target

    start.exe

  • Size

    9.4MB

  • Sample

    240716-vxp98ssfkk

  • MD5

    51a2bb8ec89f73112012022e006a8310

  • SHA1

    5a451ce108dd948dbe7ff1eb7574654608ef35d2

  • SHA256

    e5874371f444c726b62225c3e7de6e2a10b6f880a1577ef87d6a94b8c130196a

  • SHA512

    b35e0e8037b2c621bdf261973423ff5ce6764abb8aa88ee142d7bed482995c12d3404f6a798712220daba08f508503ffa6eb9c607522acb060d771501ca5d7ef

  • SSDEEP

    196608:Maj2xzKH/m4SwLRXgWPmpzdhqiYB6yD+KdWrGXMXVh1:Z2xze5L1V8d8BR5Ji

Malware Config

Targets

    • Target

      start.exe

    • Size

      9.4MB

    • MD5

      51a2bb8ec89f73112012022e006a8310

    • SHA1

      5a451ce108dd948dbe7ff1eb7574654608ef35d2

    • SHA256

      e5874371f444c726b62225c3e7de6e2a10b6f880a1577ef87d6a94b8c130196a

    • SHA512

      b35e0e8037b2c621bdf261973423ff5ce6764abb8aa88ee142d7bed482995c12d3404f6a798712220daba08f508503ffa6eb9c607522acb060d771501ca5d7ef

    • SSDEEP

      196608:Maj2xzKH/m4SwLRXgWPmpzdhqiYB6yD+KdWrGXMXVh1:Z2xze5L1V8d8BR5Ji

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks