Resubmissions

22-07-2024 01:10

240722-bjcmfatfmd 10

22-07-2024 01:05

240722-bfyeqsteme 10

General

  • Target

    Random.exe

  • Size

    10.8MB

  • Sample

    240722-bjcmfatfmd

  • MD5

    6d1350a0bf5967f1ba997dedffe269c3

  • SHA1

    62c6acf6290d228cdaf6831a453843d48ff48bea

  • SHA256

    b081ff18e10debb0c42c059e33b04cf04d9fdfe52b48be421552b48989f28463

  • SHA512

    8468c3fb5c6f807354c2ad532214deac8b446c7b362d1c4eeb97d28a02954b8c8971ed5bd3bf76e58e892c13d72faf79365a5dee6c4b3948ed387b8c1280e037

  • SSDEEP

    196608:2xUHbhJb3tQk5tsurErvI9pWj+laeAnags22/VCES9ZoQlyKvo+:/Hbh7v5tsurEUWjEVkiVCDnrkR+

Malware Config

Targets

    • Target

      Random.exe

    • Size

      10.8MB

    • MD5

      6d1350a0bf5967f1ba997dedffe269c3

    • SHA1

      62c6acf6290d228cdaf6831a453843d48ff48bea

    • SHA256

      b081ff18e10debb0c42c059e33b04cf04d9fdfe52b48be421552b48989f28463

    • SHA512

      8468c3fb5c6f807354c2ad532214deac8b446c7b362d1c4eeb97d28a02954b8c8971ed5bd3bf76e58e892c13d72faf79365a5dee6c4b3948ed387b8c1280e037

    • SSDEEP

      196608:2xUHbhJb3tQk5tsurErvI9pWj+laeAnags22/VCES9ZoQlyKvo+:/Hbh7v5tsurEUWjEVkiVCDnrkR+

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks