General

  • Target

    Dynamos.exe

  • Size

    10.3MB

  • Sample

    240722-vwas6aybjg

  • MD5

    8edbc72619d662be55d4f5e5ecc0d233

  • SHA1

    c053c652af2ae8512f613da93dc8de2a31fe9a33

  • SHA256

    b67489752c49fc812646b57c01ed7acc6f7735b8c7a6b72ca3e24d6bff328d07

  • SHA512

    1f1f56b3105f4b282f60b04ef913c2981668caed393125d7e97d4ea854cd77100e28fc5a43f0a0e2b5d3425dc1511cbaa6f797c757d1948c82f5f28e76aaa589

  • SSDEEP

    196608:1/w91Soq7n0jc/bPeNrYFJMIDJ+gsAGKoazR7LQbqmFyygWDQ2:xwGb7n0jcw8Fqy+gsc7xvr

Malware Config

Targets

    • Target

      Dynamos.exe

    • Size

      10.3MB

    • MD5

      8edbc72619d662be55d4f5e5ecc0d233

    • SHA1

      c053c652af2ae8512f613da93dc8de2a31fe9a33

    • SHA256

      b67489752c49fc812646b57c01ed7acc6f7735b8c7a6b72ca3e24d6bff328d07

    • SHA512

      1f1f56b3105f4b282f60b04ef913c2981668caed393125d7e97d4ea854cd77100e28fc5a43f0a0e2b5d3425dc1511cbaa6f797c757d1948c82f5f28e76aaa589

    • SSDEEP

      196608:1/w91Soq7n0jc/bPeNrYFJMIDJ+gsAGKoazR7LQbqmFyygWDQ2:xwGb7n0jcw8Fqy+gsc7xvr

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks