General

  • Target

    fatality_loader.rar

  • Size

    10.7MB

  • Sample

    240822-s5cyrsxekp

  • MD5

    ae28abc4faaa1407412cb2825800f2e0

  • SHA1

    494f3aef1ce101dd4641777c1479fdfecf475449

  • SHA256

    d143947de9e81d852df5f096c20f0bba2a17025bd7692d36f01f285cd8ad6910

  • SHA512

    356e885a44c8bc9ea4697d6e610957f3c036c736564c902c00d9ffb5a1a9294789fd8ab1cc23986637a00b955caa43e11b34a049e1ebc9c31feb962add762fa1

  • SSDEEP

    196608:snqDofVUcw45UQj0+uVHLs6k5A8YKZXxMQ6MhvF0k1qtuHIKuiLBAe8n:LDkUF4qf+uVHLy5FxWQ6Mht0xEIK5NXw

Malware Config

Targets

    • Target

      eRn2dncx2c2.exe

    • Size

      19.8MB

    • MD5

      c9e71718b0afe43e35e99c92c390dab7

    • SHA1

      77a4e6c7859fac46bc149da5c282fe8530d2bcf7

    • SHA256

      a99afdfc9ec37646b8b38bf87a74408830200de4484b1b75ad4041b67291201b

    • SHA512

      e5fc3599157ef4ca9e2fd7371d6a159f02b3a9e991959aa4543e5b3f5be4a3ff99adf14ee72cb5983605d8f8f7e6b25ca85a8b7e7d2b0850648ddd357fc54052

    • SSDEEP

      393216:ftWh2Jp5MivX+9/pWFGRnBsnqrIWeRaDH:1WhEvX+9/pWoGFRq

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks