General
-
Target
Boostrapper (11).exe
-
Size
49.8MB
-
Sample
240903-p5sgnsxbqj
-
MD5
cf200855953b43eba651f132da4ecd23
-
SHA1
9bc83e1f6a6b8a9aa7e1224cf62178e236c818e3
-
SHA256
fea7fe27949fb4491ea2cef150613f02e2d14b4437abec7ff3cb10f55d24384f
-
SHA512
2c5f153873e1bd7364a4d9e487bc02aa9de7e8c80ca3e534ac342821174a895e15c637a45781f2a7601e73e3bc710a8602407e6078f4653c717011c7f0e2eced
-
SSDEEP
1572864:dAOQ20j5f7vnZlT5xTivfSyWqrSaclIlm:dAOEjljbT5xentWLkQ
Static task
static1
Behavioral task
behavioral1
Sample
Boostrapper (11).exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Boostrapper (11).exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Boostrapper (11).exe
-
Size
49.8MB
-
MD5
cf200855953b43eba651f132da4ecd23
-
SHA1
9bc83e1f6a6b8a9aa7e1224cf62178e236c818e3
-
SHA256
fea7fe27949fb4491ea2cef150613f02e2d14b4437abec7ff3cb10f55d24384f
-
SHA512
2c5f153873e1bd7364a4d9e487bc02aa9de7e8c80ca3e534ac342821174a895e15c637a45781f2a7601e73e3bc710a8602407e6078f4653c717011c7f0e2eced
-
SSDEEP
1572864:dAOQ20j5f7vnZlT5xTivfSyWqrSaclIlm:dAOEjljbT5xentWLkQ
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
1System Information Discovery
4System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1