General
-
Target
lastactivityview (2).zip
-
Size
10.7MB
-
Sample
240720-pa4lfsyfqr
-
MD5
ee0eb92642970a00640ef35afc599dc4
-
SHA1
578e32f9ae8e5cf43b027ed011d77d8036e1e54a
-
SHA256
31a545b7556299c74f5fb31ec19a010d39081bbc723957f57dd07430b2903c92
-
SHA512
bc7554b88846ee0abcdef33230badef399d87398730c8518644910997b3faf6378063ac5ab12a5ad4bd87f5e18cb2d98dc04651ec25d1f6fe57dd1e0fa75d6d9
-
SSDEEP
196608:aX8z5VAzezQrelXbIs5mv97GbWtgRuN7AUxjbi80gVmE8Uz8ctypAK:uazQAXbIDv96KKRI8Uxjbi9gVbj8kyp7
Behavioral task
behavioral1
Sample
LastActivityView.chm
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
LastActivityView.chm
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
LastActivityView.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
LastActivityView.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Stub.pyc
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Stub.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
readme.txt
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
readme.txt
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
LastActivityView.chm
-
Size
19KB
-
MD5
3cfa706aecbfabf73fe8270baa528577
-
SHA1
c70eea1ddfca236d041cf138a3813a04501500d7
-
SHA256
462d2d409228e8d93f3d285472901515728bd843efb0dcbc1e66e6764588a1e0
-
SHA512
3931321b37f3957a2c881cce32f079f3bd7bc7f502e54c39fe7d225ad2b1420ede0f003930e2ef455c0e49fb9de3fb1db0db95e6d7485a36a48927006df1183c
-
SSDEEP
384:0b4M3PJFPc6yLz6G6hZoLUnFKeVRIwT07rg1ygKcU:0b4cP/c6yLz6Gu2UFKeV1T0IMTc
Score1/10 -
-
-
Target
LastActivityView.exe
-
Size
34.8MB
-
MD5
6a32155010d78a7892584835dde48c2a
-
SHA1
849d3daf1a50302c9714b132c7c4c3d552e52421
-
SHA256
c3d9f0293191a390716c92d3722fc3c308c955e78e1ac374b8f54629d741913a
-
SHA512
3246b3b8925affa432f32eb2564d01ec0e74b271c11c6ad8495dcc4ed106f4ff1112fac1832f9d62e3f98b3596b4ab57b7ff97b26758658c6fbed7d490fe06a5
-
SSDEEP
196608:/klMHfPA4mtSHeNvX+wfm/pf+xfdkR0ZWKsnarIWOzW0DaqkH:svtSUvX+9/pWFGRiBsnarIWeRaDH
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Stub.pyc
-
Size
874KB
-
MD5
7ff5fb97d67926d26087385648d3e761
-
SHA1
4671c885eaecc4bdfcd8deb301c351ad20d0f430
-
SHA256
0927a281105871640cfcc963736e6799492964e9aaf1ed313902963331fd0fdb
-
SHA512
b48002a80ae19a33ccaf46c19014ef03feebc72f44457f04afdf69815ebba1f6d6d0de5eb0bb83bdf899933fa5ab2f18e1df9eade4d7d2943a9d84343be5755b
-
SSDEEP
24576:Szz3KkQY/1lkDs8RsjJgN0jJJayYcMRb0ec0:Szxbkgw0vrk
Score3/10 -
-
-
Target
readme.txt
-
Size
15KB
-
MD5
331b2daa1922a441f02a38c7a2248312
-
SHA1
d3baa51871f5128bd216706b56094a7bacfc0793
-
SHA256
f3d8cd1a5d64d61b17ef4918542f2d6a531412b1317d48cc32fb74ffd8acbe88
-
SHA512
e151de0c1cc3ce9764e568fb7ae023b98413cf85c2a335591eedc3426682a7928444f5fb73b4a084559abad8c03a1b03de3453cabcb03c8eb9b115a75644a5b9
-
SSDEEP
384:UmfiY7ABU+H2imTAh0JLFjYdVVh+qWoIP:UmfiY7AS+xOJhsdjVW3
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1