General

  • Target

    c66f94cba849f1ffb4c6c26b19ebd125.bin

  • Size

    10.8MB

  • Sample

    240729-d4xjfs1ejq

  • MD5

    c66f94cba849f1ffb4c6c26b19ebd125

  • SHA1

    45ea5bc2c8c957c849c4268d2ccd929b0007e73a

  • SHA256

    bbe675e10ea2660c7e54eee706098fcc607f0e2d70b5562bcb8077c789608d38

  • SHA512

    e18ec4086c6f4efa81957d197603e788e29a1cbcfef6ef7c3921805faa42bd9f05fb58c2a1f22d4fe3326ced473ceb3381154adf950de340dcafc6058bebc462

  • SSDEEP

    196608:MIoAzPA4mtSHeNvX+wfm/pf+xfdkR0ZWKsnarIWOzW0DaqkH:FsvtSUvX+9/pWFGRiBsnarIWeRaDH

Malware Config

Targets

    • Target

      c66f94cba849f1ffb4c6c26b19ebd125.bin

    • Size

      10.8MB

    • MD5

      c66f94cba849f1ffb4c6c26b19ebd125

    • SHA1

      45ea5bc2c8c957c849c4268d2ccd929b0007e73a

    • SHA256

      bbe675e10ea2660c7e54eee706098fcc607f0e2d70b5562bcb8077c789608d38

    • SHA512

      e18ec4086c6f4efa81957d197603e788e29a1cbcfef6ef7c3921805faa42bd9f05fb58c2a1f22d4fe3326ced473ceb3381154adf950de340dcafc6058bebc462

    • SSDEEP

      196608:MIoAzPA4mtSHeNvX+wfm/pf+xfdkR0ZWKsnarIWOzW0DaqkH:FsvtSUvX+9/pWFGRiBsnarIWeRaDH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks