General

  • Target

    RDPAccessorV4.exe

  • Size

    21.2MB

  • Sample

    240814-dcxedazfnq

  • MD5

    bd36df9833732a95ee1c49688912f8ae

  • SHA1

    fea78c7cfcf4a0038f02a9e54a74a728d19dacbd

  • SHA256

    ddd3d4845c1793d54c69eecfde7fbdf29ebfa246b05fb5350899ccaa9a607baa

  • SHA512

    7a7faf3bada6b0873616116173bbd32703a0c0176edc2b8c3ce1bf2e7195193587753f403bf921183b79278e7d0bb5e51aecfa62910e44d155b91f4388002519

  • SSDEEP

    393216:2EygOPmCjPpY7tzSoaS5Bg2/k9Q4sUiZRlDbeibaDZf6ycplTbcBEJrYNX4LqL2p:2QpgPpqSS5zk9XgZr9qt6ysRAUYNILk4

Malware Config

Targets

    • Target

      RDPAccessorV4.exe

    • Size

      21.2MB

    • MD5

      bd36df9833732a95ee1c49688912f8ae

    • SHA1

      fea78c7cfcf4a0038f02a9e54a74a728d19dacbd

    • SHA256

      ddd3d4845c1793d54c69eecfde7fbdf29ebfa246b05fb5350899ccaa9a607baa

    • SHA512

      7a7faf3bada6b0873616116173bbd32703a0c0176edc2b8c3ce1bf2e7195193587753f403bf921183b79278e7d0bb5e51aecfa62910e44d155b91f4388002519

    • SSDEEP

      393216:2EygOPmCjPpY7tzSoaS5Bg2/k9Q4sUiZRlDbeibaDZf6ycplTbcBEJrYNX4LqL2p:2QpgPpqSS5zk9XgZr9qt6ysRAUYNILk4

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Renames multiple (55) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks