General

  • Target

    builded.exe

  • Size

    14.4MB

  • Sample

    240717-jq8mfsvbng

  • MD5

    98a6877bae1da318f3b3d81b390cf3d3

  • SHA1

    100d9a8829395281933af8fe5dca525395326f77

  • SHA256

    1c9cf5e690d1e46d914742407271d2b25a484eae6f060b33f2d62f9ae0620c4d

  • SHA512

    89c20d70a8d2f59100885f115283c0a6917f5ee94cbc4a2c0e84181c5f1c22f686095546705876757a86cbb1c2966161270e1c4035bb0397ce6f59cf61b4a3c3

  • SSDEEP

    393216:HEkwAchDIq1+TtIiFg0VBbEwv56bjE46:HI9sq1QtI6NN5UEV

Malware Config

Targets

    • Target

      builded.exe

    • Size

      14.4MB

    • MD5

      98a6877bae1da318f3b3d81b390cf3d3

    • SHA1

      100d9a8829395281933af8fe5dca525395326f77

    • SHA256

      1c9cf5e690d1e46d914742407271d2b25a484eae6f060b33f2d62f9ae0620c4d

    • SHA512

      89c20d70a8d2f59100885f115283c0a6917f5ee94cbc4a2c0e84181c5f1c22f686095546705876757a86cbb1c2966161270e1c4035bb0397ce6f59cf61b4a3c3

    • SSDEEP

      393216:HEkwAchDIq1+TtIiFg0VBbEwv56bjE46:HI9sq1QtI6NN5UEV

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks