General
-
Target
Newfolder5.rar
-
Size
11.9MB
-
Sample
240906-n4t4favhmd
-
MD5
4a0dd87c4fb8026a8784e923241d6f68
-
SHA1
3917c019bbf82012168e25991cc49d69ea6a0f9f
-
SHA256
03c83b3f458226a90a644b6894608c3d46c59cda2e62fd8654a7bfb1af241d36
-
SHA512
bb868b1657d492f032e19a5596e9277900ae494561652697581e88db6344f8a6e6b0344b8acb3bf47e78b4bce2536f508989a9cec1510920143e1fc692feef85
-
SSDEEP
196608:bUgWXJKju18YRhUm5mFKaREp8tpDJrQN1Pm55P8VhLtD5XZQqtk4JieCY:bUg8KKuHEDKFW1+antk4JSY
Behavioral task
behavioral1
Sample
New folder (5)/Loader/Gui Connect.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
New folder (5)/Loader/Gui Connect.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
New folder (5)/QllzgR.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
New folder (5)/QllzgR.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
New folder (5)/Skin Changer.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
New folder (5)/Skin Changer.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
New folder (5)/Loader/Gui Connect.api
-
Size
1KB
-
MD5
957021b88f2328790471758d1a341225
-
SHA1
a1d69fd45dceb54924c2b595758b76da1473cf3b
-
SHA256
9b1eff2282966753093378956f7ac089c915c6727b0387026dd61523d59f414e
-
SHA512
be56581801bca5bebfe46818183f3aaaf6633cf9b00b4ff17aa468cb17506f7f2f2609f62c9dc56cfd3c9ed00a08b958639ff3f4e9e63eb19947d829fc971a89
Score3/10 -
-
-
Target
New folder (5)/QllzgR.dll
-
Size
3KB
-
MD5
5734a9c64b0aae83857da23546b17ac5
-
SHA1
4bdc872a44c77d31cbc591ea9076be485e71f1a8
-
SHA256
ea315df17400825437b2e8eb16d1fd7382fa6f7c27a6d6cddd9970fcfc60df68
-
SHA512
6dc5ae0971a308f1d2d9960d9a682fe34512e70a63e605371f8fb45c9418f1757993ff093e691ddaed680039fb718c69d92c47581ed1a4cea2b5e0ad0d54555b
Score1/10 -
-
-
Target
New folder (5)/Skin Changer.exe
-
Size
12.2MB
-
MD5
61c842c4a5405955777dedab86174b67
-
SHA1
c90ae53beec6a847ab13db03156f4661361a9918
-
SHA256
33c0c309dba1ae1539b6e49b881f1abb5679ffcabf84fda8e5a4d52f588aa0a8
-
SHA512
b4376d9544cf7f280aad0c81462b954fd11cb9e6fedee6b71b48439866480a6d530c34d51f1cfa3aea096af2a123f2b3a112f1aa55f1699f720a14d82fa5cf4b
-
SSDEEP
393216:AQdqtWL01+l+uq+VvedQJlewF3MnG3xl5lcgGLrlcTuOs:AqCq01+l+uqgvedQT3MGxdZ
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1System Information Discovery
2System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1