General

  • Target

    eaef9ea2e3475a45b8f8dddad3940d7bbe564dee0dec2a0ea572a94abc04edb4

  • Size

    9.4MB

  • Sample

    240813-xjc4vsvfmm

  • MD5

    0fc98e6e61812fabb9fbb96f19b94d63

  • SHA1

    27dbae46aac953eef4fb6a451bc71a61ec9f9ba1

  • SHA256

    eaef9ea2e3475a45b8f8dddad3940d7bbe564dee0dec2a0ea572a94abc04edb4

  • SHA512

    a36fc0d88175eb5dbc3a31ed61d58ad0b79b05eea5b27a06ffa5c4fb509f8d6522ff0851d82795313b167f41570d06a61623bd6e0ac541bcca7f6d5c2bdd0513

  • SSDEEP

    196608:Sp9OmqxKtJb3tQk5tARHvUWvo3hxjno/w3iFCxHQbRpXn2rv3:GFt7v5tARHdgxro/w3uCxHQbQv

Malware Config

Targets

    • Target

      eaef9ea2e3475a45b8f8dddad3940d7bbe564dee0dec2a0ea572a94abc04edb4

    • Size

      9.4MB

    • MD5

      0fc98e6e61812fabb9fbb96f19b94d63

    • SHA1

      27dbae46aac953eef4fb6a451bc71a61ec9f9ba1

    • SHA256

      eaef9ea2e3475a45b8f8dddad3940d7bbe564dee0dec2a0ea572a94abc04edb4

    • SHA512

      a36fc0d88175eb5dbc3a31ed61d58ad0b79b05eea5b27a06ffa5c4fb509f8d6522ff0851d82795313b167f41570d06a61623bd6e0ac541bcca7f6d5c2bdd0513

    • SSDEEP

      196608:Sp9OmqxKtJb3tQk5tARHvUWvo3hxjno/w3iFCxHQbRpXn2rv3:GFt7v5tARHdgxro/w3uCxHQbQv

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks