Resubmissions

03-09-2024 13:05

240903-qbkemsydla 7

03-09-2024 13:00

240903-p8zp6aycna 7

03-09-2024 12:55

240903-p5sgnsxbqj 10

03-09-2024 12:53

240903-p4xd8sxbnk 7

General

  • Target

    Boostrapper (11).exe

  • Size

    49.8MB

  • Sample

    240903-p5sgnsxbqj

  • MD5

    cf200855953b43eba651f132da4ecd23

  • SHA1

    9bc83e1f6a6b8a9aa7e1224cf62178e236c818e3

  • SHA256

    fea7fe27949fb4491ea2cef150613f02e2d14b4437abec7ff3cb10f55d24384f

  • SHA512

    2c5f153873e1bd7364a4d9e487bc02aa9de7e8c80ca3e534ac342821174a895e15c637a45781f2a7601e73e3bc710a8602407e6078f4653c717011c7f0e2eced

  • SSDEEP

    1572864:dAOQ20j5f7vnZlT5xTivfSyWqrSaclIlm:dAOEjljbT5xentWLkQ

Malware Config

Targets

    • Target

      Boostrapper (11).exe

    • Size

      49.8MB

    • MD5

      cf200855953b43eba651f132da4ecd23

    • SHA1

      9bc83e1f6a6b8a9aa7e1224cf62178e236c818e3

    • SHA256

      fea7fe27949fb4491ea2cef150613f02e2d14b4437abec7ff3cb10f55d24384f

    • SHA512

      2c5f153873e1bd7364a4d9e487bc02aa9de7e8c80ca3e534ac342821174a895e15c637a45781f2a7601e73e3bc710a8602407e6078f4653c717011c7f0e2eced

    • SSDEEP

      1572864:dAOQ20j5f7vnZlT5xTivfSyWqrSaclIlm:dAOEjljbT5xentWLkQ

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks