General

  • Target

    gay ass slovakia guy.exe

  • Size

    11.6MB

  • Sample

    240805-xcaedsvckn

  • MD5

    1745d9cacd0b30c987fd2e639f1eab94

  • SHA1

    34e826cc371d0c95ca1a46edf59f6eadf6f70766

  • SHA256

    fcaeca188b3ad8cc99f70de017cc4f50877d7f77aa8bd431883d8752a22c6bd3

  • SHA512

    25ddc632062ac14f3a1294a5b5aa34e0a6728ee2b20248a29115b2c3b312a9f132d73a5ad303dde119b4c75c5bdac3a6a560523a67125c1b9884c6a264718a24

  • SSDEEP

    196608:lPnPAGRlvJb3tQk5tOeNvX+wfm/pf+xfdjSEqR/ziYWK5rIWOzW0DaqkH:SGRp7v5tRvX+9/pWF8NRrxB5rIWeRaDH

Malware Config

Targets

    • Target

      gay ass slovakia guy.exe

    • Size

      11.6MB

    • MD5

      1745d9cacd0b30c987fd2e639f1eab94

    • SHA1

      34e826cc371d0c95ca1a46edf59f6eadf6f70766

    • SHA256

      fcaeca188b3ad8cc99f70de017cc4f50877d7f77aa8bd431883d8752a22c6bd3

    • SHA512

      25ddc632062ac14f3a1294a5b5aa34e0a6728ee2b20248a29115b2c3b312a9f132d73a5ad303dde119b4c75c5bdac3a6a560523a67125c1b9884c6a264718a24

    • SSDEEP

      196608:lPnPAGRlvJb3tQk5tOeNvX+wfm/pf+xfdjSEqR/ziYWK5rIWOzW0DaqkH:SGRp7v5tRvX+9/pWF8NRrxB5rIWeRaDH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks