General

  • Target

    byfron-01a570a3cd0a46f2.zip

  • Size

    23.6MB

  • Sample

    240813-3ytcaawgpq

  • MD5

    f37e9fe25f88bee86e868c8796ba7624

  • SHA1

    b8b0f2969f70ac8656ca082cb4206fd1eb83ee9e

  • SHA256

    4932535e1109fad42425fc977e09c9743b5aa904a7161b8600b4a989532d3974

  • SHA512

    6b0238be58859276c1f3ad99e5b38642b0c5d92b4b86f6010c10590c568b5bc0b0559a8524993e587844d8f3652dbfdbf841039cc2f781905250b5d65acab5fe

  • SSDEEP

    393216:MZwPobA50pfTb7dQyftimFEH9ALcVxq1+TtIiFg0VQxh6uUlI6uUlT:MZwPoXpfP7Gmtim62aq1QtI6yCICT

Malware Config

Targets

    • Target

      byfron-01a570a3cd0a46f2.zip

    • Size

      23.6MB

    • MD5

      f37e9fe25f88bee86e868c8796ba7624

    • SHA1

      b8b0f2969f70ac8656ca082cb4206fd1eb83ee9e

    • SHA256

      4932535e1109fad42425fc977e09c9743b5aa904a7161b8600b4a989532d3974

    • SHA512

      6b0238be58859276c1f3ad99e5b38642b0c5d92b4b86f6010c10590c568b5bc0b0559a8524993e587844d8f3652dbfdbf841039cc2f781905250b5d65acab5fe

    • SSDEEP

      393216:MZwPobA50pfTb7dQyftimFEH9ALcVxq1+TtIiFg0VQxh6uUlI6uUlT:MZwPoXpfP7Gmtim62aq1QtI6yCICT

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Deletes itself

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks