General

  • Target

    BRUTOFORCE-SEED-V12.6.8.zip

  • Size

    65.2MB

  • Sample

    240726-bktx4sxajj

  • MD5

    4f73c08ba9c4641cd1be311059b37352

  • SHA1

    2d0a4b45eaf0e11d1ae7aa56d67e88e7fa044694

  • SHA256

    8c294a97704d97525dea5ae710a948c74dfbf98fdff3f37fa539d7f970e33e30

  • SHA512

    5409197e2bf4dd79f5b1e4c9edc54714ce38886ecab6113915caf41ae956897227b68e079fa5b4dc41649d93a6194a524ea6151e26d7ce9924e5bd614ac378c8

  • SSDEEP

    1572864:GCEnmOy4v0SH7+m38eUSgCX0CQ3+VXaw4hCnPH5:OmOKrSDX0V+VTPZ

Malware Config

Targets

    • Target

      BRUTOFORCE-SEED-V12.6.8/BRUTOFORCE SEED V12.6.8.exe

    • Size

      302KB

    • MD5

      4f1a08959f22cf24717d91bb856fb5a7

    • SHA1

      0403055db8ecddac5f3da69c42abbafe4efa1c5d

    • SHA256

      adc67d231bf92d7e1095cfc3544eea5ee5a0608f4904c62285f3f9859c22f5d8

    • SHA512

      22511c451d36f93a5ba371dad63f65dd1398005e482e10110bd3b943ac065d655935246f5f30fc9486134374243225fb92482dc2d8292021a8234ddf044696c7

    • SSDEEP

      6144:LuowAwJi0eJErAJoqVtUvNhlvPgGcMEF8kdmta7d0x:SowAwJpeSAJoqVtUvNz4ckdn7d0

    • Detects Monster Stealer.

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Monster

      Monster is a Golang stealer that was discovered in 2024.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • Target

      BRUTOFORCE-SEED-V12.6.8/data32.cfg

    • Size

      238KB

    • MD5

      4e6a7ee0e286ab61d36c26bd38996821

    • SHA1

      820674b4c75290f8f667764bfb474ca8c1242732

    • SHA256

      f67daf4bf2ad0e774bbd53f243e66806397036e5fde694f3856b27bc0463c0a3

    • SHA512

      f9d99d960afce980421e654d1d541c1fdb81252615c48eed5c4a5c962cb20123d06dbdf383a37a476aa41e4ffabca30e95a8735739c35f66efbaa1dee8a9ba8a

    • SSDEEP

      3072:6sGTNBBPt3lBtx5ebLDCc0p00JakwEn0ZtAq0nHHdNwooe+6t3ieCx9UWPrcFw+z:ID5t3lBrGdkwFi3HHdN1Zt9CxVgeH

    Score
    3/10
    • Target

      BRUTOFORCE-SEED-V12.6.8/drivefsext.bin

    • Size

      211KB

    • MD5

      59238144771807b1cbc407b250d6b2c3

    • SHA1

      6c9f87cca7e857e888cb19ea45cf82d2e2d29695

    • SHA256

      8baa5811836c0b4a64810f6a7d6e1d31d7f80350c69643dc9594f58fd0233a7b

    • SHA512

      cf2f8b84526ae8a1445a2d8a2b9099b164f80a7b7290f68058583b0b235395d749ad0b726c4e36d5e901c18d6946fd9b0dd76c20016b65dc7a3977f68ee4a220

    • SSDEEP

      3072:CFITGLr+kmeUE2+YA8zuxD1gb/uVVohUFVEovODl9ply5nk/7K1bjT5h3qs:CbLUEkAtvaumhUXvwl9P62

    Score
    3/10
    • Target

      BRUTOFORCE-SEED-V12.6.8/lib.lib

    • Size

      64.4MB

    • MD5

      f4db0c6f4eac031121dfc08675c84e7c

    • SHA1

      e419149294889f087d7b3122f484a7453fc23210

    • SHA256

      cfcd1ec2315a49c410bcef131cc4d1e7674364c34a20902fed43e20d053978e0

    • SHA512

      40d159283f5176ce42680309948be2127740ddf8078b1bb81dc69ff9672553158f186fd9a55cfb1348bb5ff118c38d1cb52c9fd4b5218672808773e0b164d9cc

    • SSDEEP

      1572864:tCEnmOy4v0SH7+m38eUSgCX0CQ3+VXaw4hCnPHK:bmOKrSDX0V+VTPq

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks