General

  • Target

    FreeCCs.scr

  • Size

    11.5MB

  • Sample

    240907-ths7xasall

  • MD5

    b80e343c5eb7f423ba4e1a9c03f202f2

  • SHA1

    d423d73a0796240f9dcdcf128f62f89b0431cbab

  • SHA256

    0b567424e8497a4c1a3f427f3b397a391596f211f685e2d3cab19221d76564d6

  • SHA512

    a13f2f40d95f4b09b9a714ad722deb03260148fc47f01783c46b1c6483ed5ea4c95414d226337449a8174c551fc82199c823d1e7b20d1fdcbe455bd5135ea9ca

  • SSDEEP

    196608:fqwEg/oJJ3FEsI3kXJeV1UhbL9sSC+GQw0RCBNukSjnvl59VroGGReov:wgmJVEsXXJMGdLg0GuhhoFt

Malware Config

Targets

    • Target

      FreeCCs.scr

    • Size

      11.5MB

    • MD5

      b80e343c5eb7f423ba4e1a9c03f202f2

    • SHA1

      d423d73a0796240f9dcdcf128f62f89b0431cbab

    • SHA256

      0b567424e8497a4c1a3f427f3b397a391596f211f685e2d3cab19221d76564d6

    • SHA512

      a13f2f40d95f4b09b9a714ad722deb03260148fc47f01783c46b1c6483ed5ea4c95414d226337449a8174c551fc82199c823d1e7b20d1fdcbe455bd5135ea9ca

    • SSDEEP

      196608:fqwEg/oJJ3FEsI3kXJeV1UhbL9sSC+GQw0RCBNukSjnvl59VroGGReov:wgmJVEsXXJMGdLg0GuhhoFt

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks