General

  • Target

    lastactivityview (2).zip

  • Size

    10.7MB

  • Sample

    240720-pa4lfsyfqr

  • MD5

    ee0eb92642970a00640ef35afc599dc4

  • SHA1

    578e32f9ae8e5cf43b027ed011d77d8036e1e54a

  • SHA256

    31a545b7556299c74f5fb31ec19a010d39081bbc723957f57dd07430b2903c92

  • SHA512

    bc7554b88846ee0abcdef33230badef399d87398730c8518644910997b3faf6378063ac5ab12a5ad4bd87f5e18cb2d98dc04651ec25d1f6fe57dd1e0fa75d6d9

  • SSDEEP

    196608:aX8z5VAzezQrelXbIs5mv97GbWtgRuN7AUxjbi80gVmE8Uz8ctypAK:uazQAXbIDv96KKRI8Uxjbi9gVbj8kyp7

Malware Config

Targets

    • Target

      LastActivityView.chm

    • Size

      19KB

    • MD5

      3cfa706aecbfabf73fe8270baa528577

    • SHA1

      c70eea1ddfca236d041cf138a3813a04501500d7

    • SHA256

      462d2d409228e8d93f3d285472901515728bd843efb0dcbc1e66e6764588a1e0

    • SHA512

      3931321b37f3957a2c881cce32f079f3bd7bc7f502e54c39fe7d225ad2b1420ede0f003930e2ef455c0e49fb9de3fb1db0db95e6d7485a36a48927006df1183c

    • SSDEEP

      384:0b4M3PJFPc6yLz6G6hZoLUnFKeVRIwT07rg1ygKcU:0b4cP/c6yLz6Gu2UFKeV1T0IMTc

    Score
    1/10
    • Target

      LastActivityView.exe

    • Size

      34.8MB

    • MD5

      6a32155010d78a7892584835dde48c2a

    • SHA1

      849d3daf1a50302c9714b132c7c4c3d552e52421

    • SHA256

      c3d9f0293191a390716c92d3722fc3c308c955e78e1ac374b8f54629d741913a

    • SHA512

      3246b3b8925affa432f32eb2564d01ec0e74b271c11c6ad8495dcc4ed106f4ff1112fac1832f9d62e3f98b3596b4ab57b7ff97b26758658c6fbed7d490fe06a5

    • SSDEEP

      196608:/klMHfPA4mtSHeNvX+wfm/pf+xfdkR0ZWKsnarIWOzW0DaqkH:svtSUvX+9/pWFGRiBsnarIWeRaDH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

    • Target

      Stub.pyc

    • Size

      874KB

    • MD5

      7ff5fb97d67926d26087385648d3e761

    • SHA1

      4671c885eaecc4bdfcd8deb301c351ad20d0f430

    • SHA256

      0927a281105871640cfcc963736e6799492964e9aaf1ed313902963331fd0fdb

    • SHA512

      b48002a80ae19a33ccaf46c19014ef03feebc72f44457f04afdf69815ebba1f6d6d0de5eb0bb83bdf899933fa5ab2f18e1df9eade4d7d2943a9d84343be5755b

    • SSDEEP

      24576:Szz3KkQY/1lkDs8RsjJgN0jJJayYcMRb0ec0:Szxbkgw0vrk

    Score
    3/10
    • Target

      readme.txt

    • Size

      15KB

    • MD5

      331b2daa1922a441f02a38c7a2248312

    • SHA1

      d3baa51871f5128bd216706b56094a7bacfc0793

    • SHA256

      f3d8cd1a5d64d61b17ef4918542f2d6a531412b1317d48cc32fb74ffd8acbe88

    • SHA512

      e151de0c1cc3ce9764e568fb7ae023b98413cf85c2a335591eedc3426682a7928444f5fb73b4a084559abad8c03a1b03de3453cabcb03c8eb9b115a75644a5b9

    • SSDEEP

      384:UmfiY7ABU+H2imTAh0JLFjYdVVh+qWoIP:UmfiY7AS+xOJhsdjVW3

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks