General

  • Target

    cAWBUr

  • Size

    498B

  • Sample

    240806-pa4lfssfka

  • MD5

    33905f38b6e85154f61b450c22222620

  • SHA1

    cd01efeeee6c662194a370208ff0bf1f2cb7901b

  • SHA256

    47049194902b46f7ea51a4ee8fba64a9869bf34b4c2a2f38fb4d8cbc59ed2cea

  • SHA512

    6ee63ad9ae02a1c7c02e4bbf87bab0cbd03ddbdf078889d0e92317d93584e385e38571ea7544b8179cdba66c243784695887fd49414eb22be32de0f66dd02169

Malware Config

Targets

    • Target

      cAWBUr

    • Size

      498B

    • MD5

      33905f38b6e85154f61b450c22222620

    • SHA1

      cd01efeeee6c662194a370208ff0bf1f2cb7901b

    • SHA256

      47049194902b46f7ea51a4ee8fba64a9869bf34b4c2a2f38fb4d8cbc59ed2cea

    • SHA512

      6ee63ad9ae02a1c7c02e4bbf87bab0cbd03ddbdf078889d0e92317d93584e385e38571ea7544b8179cdba66c243784695887fd49414eb22be32de0f66dd02169

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Deletes itself

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks