General
-
Target
Proudial Injector.zip
-
Size
10.7MB
-
Sample
240815-f5kmdsxakd
-
MD5
b79a290ba6832f4e919a1cdbc40fa868
-
SHA1
a623cd1b2431f180fb58714e302b2dd665d2ab2f
-
SHA256
c5f3efea8cd1b11b8c30a113b4657cc4a97aa1543503ff471abb8d21572e5a2b
-
SHA512
85361e8d1370f11c6e09a4de06a7a7ff61c1d429490c30541a23b13d88db81cdfdd777e9f830cc5b8cd856b9aa4a45388f54ea76629bd0b890dde86b3f8932ab
-
SSDEEP
196608:EqoEXPDLYK69Zmmrd0ePLtDhqFnbjI7n7KkxqbjEujIep+dG8lo:xPYT9ZmcVPxFqFHXkxqbjESwG8i
Behavioral task
behavioral1
Sample
Proudial Injector.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Новая папка (19)/Proudial Injector.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Proudial Injector.zip
-
Size
10.7MB
-
MD5
b79a290ba6832f4e919a1cdbc40fa868
-
SHA1
a623cd1b2431f180fb58714e302b2dd665d2ab2f
-
SHA256
c5f3efea8cd1b11b8c30a113b4657cc4a97aa1543503ff471abb8d21572e5a2b
-
SHA512
85361e8d1370f11c6e09a4de06a7a7ff61c1d429490c30541a23b13d88db81cdfdd777e9f830cc5b8cd856b9aa4a45388f54ea76629bd0b890dde86b3f8932ab
-
SSDEEP
196608:EqoEXPDLYK69Zmmrd0ePLtDhqFnbjI7n7KkxqbjEujIep+dG8lo:xPYT9ZmcVPxFqFHXkxqbjESwG8i
Score1/10 -
-
-
Target
Новая папка (19)/Proudial Injector.exe
-
Size
10.8MB
-
MD5
ba39f4e3a726f9f3e3e3326afa0f0567
-
SHA1
d206a22d92110b06aea405b1770bfc8fd958c31b
-
SHA256
632b28e3fe1c501f9c8d173da26c293857112799723e73a6f931caa7f62c2392
-
SHA512
eb29ba226a5ba409643186ce7cc466745e3c7768b88928b4a83612e94012d070926df5d3303a35ead29b6d7672099aacea295c215b79a7f6a4c063748757bdd6
-
SSDEEP
196608:SwK8IBAY3Jb3tQk5tOeNvX+wfm/pf+xfdkRbYIWKRrIWOzW0DaqkH:RK8VY37v5tRvX+9/pWFGR0IBRrIWeRaL
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Stub.pyc
-
Size
875KB
-
MD5
838e95ef7ad079631bc14b6cce304298
-
SHA1
c12713695154003bdd0b43de7206a0edc56ba731
-
SHA256
a074ddb4c97ef3ac48f3636ee0de19f2304e92c991c3a24aac3ec7fdee2fdf93
-
SHA512
3a16396507fcaf8067344911f547e2fe9a2e35842c8a5fbd3db2c983bd0c6cc4d9275f019f724ca6a69f3746b4da8fda269c4949d866693e919e9020879894f5
-
SSDEEP
12288:jNur4QqS5phL2AFgOHC26LAAjgyq53uoniYcrWL7xorU9pVs5wFGzf:jNur4a5LZ4xFxe72r8jSf
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
1System Information Discovery
5System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1