General

  • Target

    Skin Changer.exe

  • Size

    12.2MB

  • Sample

    240831-el419avcqf

  • MD5

    61c842c4a5405955777dedab86174b67

  • SHA1

    c90ae53beec6a847ab13db03156f4661361a9918

  • SHA256

    33c0c309dba1ae1539b6e49b881f1abb5679ffcabf84fda8e5a4d52f588aa0a8

  • SHA512

    b4376d9544cf7f280aad0c81462b954fd11cb9e6fedee6b71b48439866480a6d530c34d51f1cfa3aea096af2a123f2b3a112f1aa55f1699f720a14d82fa5cf4b

  • SSDEEP

    393216:AQdqtWL01+l+uq+VvedQJlewF3MnG3xl5lcgGLrlcTuOs:AqCq01+l+uqgvedQT3MGxdZ

Malware Config

Targets

    • Target

      Skin Changer.exe

    • Size

      12.2MB

    • MD5

      61c842c4a5405955777dedab86174b67

    • SHA1

      c90ae53beec6a847ab13db03156f4661361a9918

    • SHA256

      33c0c309dba1ae1539b6e49b881f1abb5679ffcabf84fda8e5a4d52f588aa0a8

    • SHA512

      b4376d9544cf7f280aad0c81462b954fd11cb9e6fedee6b71b48439866480a6d530c34d51f1cfa3aea096af2a123f2b3a112f1aa55f1699f720a14d82fa5cf4b

    • SSDEEP

      393216:AQdqtWL01+l+uq+VvedQJlewF3MnG3xl5lcgGLrlcTuOs:AqCq01+l+uqgvedQT3MGxdZ

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • Target

      Stub.pyc

    • Size

      198KB

    • MD5

      bf50be6023ad3852cf8dafe71ae0149e

    • SHA1

      a497396e43fd9bd19f699293f4a043283f6ce997

    • SHA256

      45dc909ea64b61dea3cc8aea2e85aede247f7970915c3ef18451748146c7a79c

    • SHA512

      4a98130ae575ad3a32e9801eb5354ad760e7dbec505f7216909ed391aa7f21d17f81a9d3cb386bf51451a4345f6bca4fe0236e2d68ac779400641493fa7a50b4

    • SSDEEP

      6144:MeYPhr47CTpKfTgYhYYYYY9YYjTFlZE1l:5spAsFlZ+

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks