Resubmissions

25-08-2024 20:46

240825-zkkanstgqe 10

25-08-2024 20:43

240825-zhyqaavhpr 8

General

  • Target

    TMP48CC.tmp

  • Size

    10.6MB

  • Sample

    240825-zkkanstgqe

  • MD5

    f7a5f232f46b726be8c59c12292fe6ad

  • SHA1

    0a258a105aa343dee4ee96fdb8d8c13f67f83969

  • SHA256

    88c1b0cd97bad80a516aa2ee8e45753a69e2b791aca7f665f32bd6b5c38db1b5

  • SHA512

    243a83037e96c4f56e6def22697075122ccf02bac33291501484209b2319c8bc5690002c48e176d567147d135f698394f4ad7c9468068fe08ba54098385ab420

  • SSDEEP

    196608:9iKqc9NYeYcWuB8KIuW4Drp0dhCed8s4VNvLRMQ3aRmf:Wc9XTWuN/qdcFj7jt3V

Malware Config

Targets

    • Target

      TMP48CC.tmp

    • Size

      10.6MB

    • MD5

      f7a5f232f46b726be8c59c12292fe6ad

    • SHA1

      0a258a105aa343dee4ee96fdb8d8c13f67f83969

    • SHA256

      88c1b0cd97bad80a516aa2ee8e45753a69e2b791aca7f665f32bd6b5c38db1b5

    • SHA512

      243a83037e96c4f56e6def22697075122ccf02bac33291501484209b2319c8bc5690002c48e176d567147d135f698394f4ad7c9468068fe08ba54098385ab420

    • SSDEEP

      196608:9iKqc9NYeYcWuB8KIuW4Drp0dhCed8s4VNvLRMQ3aRmf:Wc9XTWuN/qdcFj7jt3V

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks