General

  • Target

    auxia_loader.exe

  • Size

    47.7MB

  • Sample

    240824-fpr2javana

  • MD5

    391e83a31bc6a4906f6f4c45d6c64296

  • SHA1

    3a1b812e58966442f43e2253419dbc5c7a3728dc

  • SHA256

    22c715e0a0c48b1ee1cf110c6656dc441c04a6fb4acc6efacec7cdc98f5037c3

  • SHA512

    3c7634f2cfa8fe9b5f16016e11baddcff6c7d696ad37376b76bfac1a9005b84acbd29f26a720a6c912b64cdc72e1981478373950b4a14a418f78c2cb27856405

  • SSDEEP

    196608:jWs51wJb3tQk5tcB6yavnlPzf+JiJCsVMvgLnKFLhSiJpmx:6N7v5tcBRavnlPSa7WvgeZrmx

Malware Config

Targets

    • Target

      auxia_loader.exe

    • Size

      47.7MB

    • MD5

      391e83a31bc6a4906f6f4c45d6c64296

    • SHA1

      3a1b812e58966442f43e2253419dbc5c7a3728dc

    • SHA256

      22c715e0a0c48b1ee1cf110c6656dc441c04a6fb4acc6efacec7cdc98f5037c3

    • SHA512

      3c7634f2cfa8fe9b5f16016e11baddcff6c7d696ad37376b76bfac1a9005b84acbd29f26a720a6c912b64cdc72e1981478373950b4a14a418f78c2cb27856405

    • SSDEEP

      196608:jWs51wJb3tQk5tcB6yavnlPzf+JiJCsVMvgLnKFLhSiJpmx:6N7v5tcBRavnlPSa7WvgeZrmx

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • Target

      Stub.pyc

    • Size

      874KB

    • MD5

      8fc5a06161d47317f5a97f2c76cbba6e

    • SHA1

      6438cc8edc9bd08ddfba78079b352c6aea92e945

    • SHA256

      5676900dbe7afa5c9d70354a7c553db29bdd3acca73449e6ae6f276c2fec6b56

    • SHA512

      fb1c7d2aa90a585184a269b2c1d014e3bdc7a97e4dc014a6915b28582817181907c07b0d628cd1e90b736ccdab4a0880f74b72aa2698aafb230bd112e1e5e0f5

    • SSDEEP

      24576:7Q7kerdwCF6o753sWIqDDOKB/hCcYr0o3eEu:Pkss1YrVO9

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks