General

  • Target

    cbnmbe.exe

  • Size

    11.6MB

  • Sample

    240717-q7mvmstdmk

  • MD5

    19ee0c62d058248939477b1820914f2a

  • SHA1

    27e2456ec9032f75c60408090227b3f4d988b2d0

  • SHA256

    da789a7653878711e481cbb64cd70506ef0722fea35c4aef8c0f937c6d859544

  • SHA512

    77251640b494a4757dbbc69414b43897f6b5f43169b6ab5ba7d0b60c4e0cefa18099c6fa8d42901ead2624b32207a227aa73bfd1871f3e50ce0219d7ba4408aa

  • SSDEEP

    196608:8xEWvPA+mtSreNvX+wfm/pf+xfdjSEqRZyTlKsn+rwWOtW0DaF1H:gEdRtSQvX+9/pWF8NRGAsn+rwWIRajH

Malware Config

Targets

    • Target

      cbnmbe.exe

    • Size

      11.6MB

    • MD5

      19ee0c62d058248939477b1820914f2a

    • SHA1

      27e2456ec9032f75c60408090227b3f4d988b2d0

    • SHA256

      da789a7653878711e481cbb64cd70506ef0722fea35c4aef8c0f937c6d859544

    • SHA512

      77251640b494a4757dbbc69414b43897f6b5f43169b6ab5ba7d0b60c4e0cefa18099c6fa8d42901ead2624b32207a227aa73bfd1871f3e50ce0219d7ba4408aa

    • SSDEEP

      196608:8xEWvPA+mtSreNvX+wfm/pf+xfdjSEqRZyTlKsn+rwWOtW0DaF1H:gEdRtSQvX+9/pWF8NRGAsn+rwWIRajH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks