General

  • Target

    Crypted Free Spoofer.exe

  • Size

    12.2MB

  • Sample

    240718-1sw5waybmp

  • MD5

    988ee1d9d1881696b38cb6749f7aac51

  • SHA1

    0ecdf23291fcdca20de60c765a63023226ebf890

  • SHA256

    d3d9e1a1a88ea7528afd146ed014cd5468139fee8f21ba6a2675c49dcb30f218

  • SHA512

    d79a777c6ff0f1ba5d55299a1a8c677f5b46b58aee98b706a7ff132ab559a4b43f5f4ca3747b44557925bb4fdfcca991299196c474dc97cef9ba54c400ed3ba4

  • SSDEEP

    393216:yQ5BYD8i2tSZL+9qzGZaSJHh1JdOXJfBlx2:5s+9q6ZaSJHh1TOZc

Malware Config

Targets

    • Target

      Crypted Free Spoofer.exe

    • Size

      12.2MB

    • MD5

      988ee1d9d1881696b38cb6749f7aac51

    • SHA1

      0ecdf23291fcdca20de60c765a63023226ebf890

    • SHA256

      d3d9e1a1a88ea7528afd146ed014cd5468139fee8f21ba6a2675c49dcb30f218

    • SHA512

      d79a777c6ff0f1ba5d55299a1a8c677f5b46b58aee98b706a7ff132ab559a4b43f5f4ca3747b44557925bb4fdfcca991299196c474dc97cef9ba54c400ed3ba4

    • SSDEEP

      393216:yQ5BYD8i2tSZL+9qzGZaSJHh1JdOXJfBlx2:5s+9q6ZaSJHh1TOZc

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Modifies visiblity of hidden/system files in Explorer

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks