General

  • Target

    Newfolder5.rar

  • Size

    11.9MB

  • Sample

    240906-n4t4favhmd

  • MD5

    4a0dd87c4fb8026a8784e923241d6f68

  • SHA1

    3917c019bbf82012168e25991cc49d69ea6a0f9f

  • SHA256

    03c83b3f458226a90a644b6894608c3d46c59cda2e62fd8654a7bfb1af241d36

  • SHA512

    bb868b1657d492f032e19a5596e9277900ae494561652697581e88db6344f8a6e6b0344b8acb3bf47e78b4bce2536f508989a9cec1510920143e1fc692feef85

  • SSDEEP

    196608:bUgWXJKju18YRhUm5mFKaREp8tpDJrQN1Pm55P8VhLtD5XZQqtk4JieCY:bUg8KKuHEDKFW1+antk4JSY

Malware Config

Targets

    • Target

      New folder (5)/Loader/Gui Connect.api

    • Size

      1KB

    • MD5

      957021b88f2328790471758d1a341225

    • SHA1

      a1d69fd45dceb54924c2b595758b76da1473cf3b

    • SHA256

      9b1eff2282966753093378956f7ac089c915c6727b0387026dd61523d59f414e

    • SHA512

      be56581801bca5bebfe46818183f3aaaf6633cf9b00b4ff17aa468cb17506f7f2f2609f62c9dc56cfd3c9ed00a08b958639ff3f4e9e63eb19947d829fc971a89

    Score
    3/10
    • Target

      New folder (5)/QllzgR.dll

    • Size

      3KB

    • MD5

      5734a9c64b0aae83857da23546b17ac5

    • SHA1

      4bdc872a44c77d31cbc591ea9076be485e71f1a8

    • SHA256

      ea315df17400825437b2e8eb16d1fd7382fa6f7c27a6d6cddd9970fcfc60df68

    • SHA512

      6dc5ae0971a308f1d2d9960d9a682fe34512e70a63e605371f8fb45c9418f1757993ff093e691ddaed680039fb718c69d92c47581ed1a4cea2b5e0ad0d54555b

    Score
    1/10
    • Target

      New folder (5)/Skin Changer.exe

    • Size

      12.2MB

    • MD5

      61c842c4a5405955777dedab86174b67

    • SHA1

      c90ae53beec6a847ab13db03156f4661361a9918

    • SHA256

      33c0c309dba1ae1539b6e49b881f1abb5679ffcabf84fda8e5a4d52f588aa0a8

    • SHA512

      b4376d9544cf7f280aad0c81462b954fd11cb9e6fedee6b71b48439866480a6d530c34d51f1cfa3aea096af2a123f2b3a112f1aa55f1699f720a14d82fa5cf4b

    • SSDEEP

      393216:AQdqtWL01+l+uq+VvedQJlewF3MnG3xl5lcgGLrlcTuOs:AqCq01+l+uqgvedQT3MGxdZ

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks