General

  • Target

    V0ID.exe

  • Size

    12.8MB

  • Sample

    240815-zjwmbaxgqp

  • MD5

    51b6d27a87f2da883dfffa46b3e759de

  • SHA1

    aad6fac75497883d9ed1a7273625599c0817f42b

  • SHA256

    39d2e86859ea01a5586dd29cdc4a7a66810dd203814043822a0fc41bce390df9

  • SHA512

    bbc8c7663a4654c71de9e95891955460dcc097f4840787645268859ceccec3a00a38fa0ec105ab894285f64fcc2f5c6bdfba458e8633c6bc64c0848d264b34d1

  • SSDEEP

    393216:CQdq/L01+l+uq+Vv2dQJlewF3MnG3xlCOOBsnarIWeRaDH:Cq+01+l+uqgv2dQT3MGqO2GVRq

Malware Config

Targets

    • Target

      V0ID.exe

    • Size

      12.8MB

    • MD5

      51b6d27a87f2da883dfffa46b3e759de

    • SHA1

      aad6fac75497883d9ed1a7273625599c0817f42b

    • SHA256

      39d2e86859ea01a5586dd29cdc4a7a66810dd203814043822a0fc41bce390df9

    • SHA512

      bbc8c7663a4654c71de9e95891955460dcc097f4840787645268859ceccec3a00a38fa0ec105ab894285f64fcc2f5c6bdfba458e8633c6bc64c0848d264b34d1

    • SSDEEP

      393216:CQdq/L01+l+uq+Vv2dQJlewF3MnG3xlCOOBsnarIWeRaDH:Cq+01+l+uqgv2dQT3MGqO2GVRq

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • Target

      Stub.pyc

    • Size

      198KB

    • MD5

      53cd398d8ec8f9a90c7e40e3fb2b7416

    • SHA1

      485e67d9c4b50f55203a559781f48f20d40ef2b0

    • SHA256

      30d9c8db8a21c26ff3fef8f1d940864ea3e78767e9b5f8b7fef9c066268552ef

    • SHA512

      a7029711cd4dc9f95ae64ecc16db7905f9919d94202253899e51309aa6dae381db9b886d867316e07a653190bd14ee6f77283858b8f8207aff5619a083f4565e

    • SSDEEP

      6144:teYPhfY7jeTWTZeYhYYYYY9YYeNxlZbyX:UeTIfxlZ+

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks