General

  • Target

    FIVEMEXTERNAL.exe

  • Size

    38.8MB

  • Sample

    240901-nclyraygpm

  • MD5

    2afc219d8885c4c185eee4f6c8004e0f

  • SHA1

    5574b00a3f2fab89efcb9aad94ccff3029cff817

  • SHA256

    9ddf5b5eabcec1b0e1d5f5f4d5f26ba60af2e0cbfc98cb9f2f550b3f5efc02e9

  • SHA512

    36baf115ae1e92f427d7f787b34580a2d45bb33758e9a69142c051ff6969b1cee9eec5b08225a413b2ec2d8c3c3190062364f48c99bd34e127f1949c8d329325

  • SSDEEP

    786432:zEeCwvmCGas4CtOIF0QnI8VhuLOQGj+UR0KVqeg/LUMXWNs1NrjO0tdZ4EP:QeCuHI9nIghDQBgpVqegxWNCNrjOQyE

Malware Config

Targets

    • Target

      FIVEMEXTERNAL.exe

    • Size

      38.8MB

    • MD5

      2afc219d8885c4c185eee4f6c8004e0f

    • SHA1

      5574b00a3f2fab89efcb9aad94ccff3029cff817

    • SHA256

      9ddf5b5eabcec1b0e1d5f5f4d5f26ba60af2e0cbfc98cb9f2f550b3f5efc02e9

    • SHA512

      36baf115ae1e92f427d7f787b34580a2d45bb33758e9a69142c051ff6969b1cee9eec5b08225a413b2ec2d8c3c3190062364f48c99bd34e127f1949c8d329325

    • SSDEEP

      786432:zEeCwvmCGas4CtOIF0QnI8VhuLOQGj+UR0KVqeg/LUMXWNs1NrjO0tdZ4EP:QeCuHI9nIghDQBgpVqegxWNCNrjOQyE

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks