General

  • Target

    Krampus Modded.exe

  • Size

    9.5MB

  • Sample

    240902-f5xxqatfre

  • MD5

    fdde59aaea488147c24627be743bf4c1

  • SHA1

    d41a7a8bcabd05a87d9b2395c81c4ed25f92b361

  • SHA256

    2f92300f7368bd55c68dcbbf9220f0dad9c4c195a4e236d8e18d227cc2218644

  • SHA512

    326ed5b99f164e9f72861f74ef0982d244bc5d8438da90c968331066e47b0ddaa8d0986454f29cf7dcee80b9a115eccc280863c20062868a5a02ff7182ec3b7e

  • SSDEEP

    196608:OKeT6RvPxMJb3tQk5tMeNsHFJMIDJ+gsAGKkR4Db/1:Ty17v5tTYFqy+gs1c

Malware Config

Targets

    • Target

      Krampus Modded.exe

    • Size

      9.5MB

    • MD5

      fdde59aaea488147c24627be743bf4c1

    • SHA1

      d41a7a8bcabd05a87d9b2395c81c4ed25f92b361

    • SHA256

      2f92300f7368bd55c68dcbbf9220f0dad9c4c195a4e236d8e18d227cc2218644

    • SHA512

      326ed5b99f164e9f72861f74ef0982d244bc5d8438da90c968331066e47b0ddaa8d0986454f29cf7dcee80b9a115eccc280863c20062868a5a02ff7182ec3b7e

    • SSDEEP

      196608:OKeT6RvPxMJb3tQk5tMeNsHFJMIDJ+gsAGKkR4Db/1:Ty17v5tTYFqy+gs1c

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks