General

  • Target

    Proudial Injector.zip

  • Size

    10.7MB

  • Sample

    240815-f5kmdsxakd

  • MD5

    b79a290ba6832f4e919a1cdbc40fa868

  • SHA1

    a623cd1b2431f180fb58714e302b2dd665d2ab2f

  • SHA256

    c5f3efea8cd1b11b8c30a113b4657cc4a97aa1543503ff471abb8d21572e5a2b

  • SHA512

    85361e8d1370f11c6e09a4de06a7a7ff61c1d429490c30541a23b13d88db81cdfdd777e9f830cc5b8cd856b9aa4a45388f54ea76629bd0b890dde86b3f8932ab

  • SSDEEP

    196608:EqoEXPDLYK69Zmmrd0ePLtDhqFnbjI7n7KkxqbjEujIep+dG8lo:xPYT9ZmcVPxFqFHXkxqbjESwG8i

Malware Config

Targets

    • Target

      Proudial Injector.zip

    • Size

      10.7MB

    • MD5

      b79a290ba6832f4e919a1cdbc40fa868

    • SHA1

      a623cd1b2431f180fb58714e302b2dd665d2ab2f

    • SHA256

      c5f3efea8cd1b11b8c30a113b4657cc4a97aa1543503ff471abb8d21572e5a2b

    • SHA512

      85361e8d1370f11c6e09a4de06a7a7ff61c1d429490c30541a23b13d88db81cdfdd777e9f830cc5b8cd856b9aa4a45388f54ea76629bd0b890dde86b3f8932ab

    • SSDEEP

      196608:EqoEXPDLYK69Zmmrd0ePLtDhqFnbjI7n7KkxqbjEujIep+dG8lo:xPYT9ZmcVPxFqFHXkxqbjESwG8i

    Score
    1/10
    • Target

      Новая папка (19)/Proudial Injector.exe

    • Size

      10.8MB

    • MD5

      ba39f4e3a726f9f3e3e3326afa0f0567

    • SHA1

      d206a22d92110b06aea405b1770bfc8fd958c31b

    • SHA256

      632b28e3fe1c501f9c8d173da26c293857112799723e73a6f931caa7f62c2392

    • SHA512

      eb29ba226a5ba409643186ce7cc466745e3c7768b88928b4a83612e94012d070926df5d3303a35ead29b6d7672099aacea295c215b79a7f6a4c063748757bdd6

    • SSDEEP

      196608:SwK8IBAY3Jb3tQk5tOeNvX+wfm/pf+xfdkRbYIWKRrIWOzW0DaqkH:RK8VY37v5tRvX+9/pWFGR0IBRrIWeRaL

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • Target

      Stub.pyc

    • Size

      875KB

    • MD5

      838e95ef7ad079631bc14b6cce304298

    • SHA1

      c12713695154003bdd0b43de7206a0edc56ba731

    • SHA256

      a074ddb4c97ef3ac48f3636ee0de19f2304e92c991c3a24aac3ec7fdee2fdf93

    • SHA512

      3a16396507fcaf8067344911f547e2fe9a2e35842c8a5fbd3db2c983bd0c6cc4d9275f019f724ca6a69f3746b4da8fda269c4949d866693e919e9020879894f5

    • SSDEEP

      12288:jNur4QqS5phL2AFgOHC26LAAjgyq53uoniYcrWL7xorU9pVs5wFGzf:jNur4a5LZ4xFxe72r8jSf

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks