Overview
overview
10Static
static
7libavresample-4.zip
windows10-2004-x64
10libavresample-4.zip
windows11-21h2-x64
1NexusChecker.exe
windows10-2004-x64
9NexusChecker.exe
windows11-21h2-x64
9freebl3.dll
windows10-2004-x64
1freebl3.dll
windows11-21h2-x64
1gkcodecs.dll
windows10-2004-x64
1gkcodecs.dll
windows11-21h2-x64
1libavresample-4.dll
windows10-2004-x64
3libavresample-4.dll
windows11-21h2-x64
6libavutil-56.dll
windows10-2004-x64
3libavutil-56.dll
windows11-21h2-x64
3General
-
Target
libavresample-4.zip
-
Size
4.4MB
-
Sample
240912-tey9rasfnl
-
MD5
095b59d6465bf6491daccd0d4cf9baf0
-
SHA1
b5d488cf23c1a6e6e7cfaa777657f8ad9a87ec32
-
SHA256
35155e8468c1287a21e03699a55325378001fa060ee79a1db8f5b02e82adc33d
-
SHA512
8aa151f915a6d2190246d0000ab5d2a27646fd925522cb334fb7273e93135c1becf4fd19980afccaf5730d5d178889a1b52acb012814ac6fc16dcb4dd781ef29
-
SSDEEP
98304:c8luglqUM5DjX1SUeQAbWSFhMDC//X3yV8:/l4ZjFSpQAb1hK6c8
Behavioral task
behavioral1
Sample
libavresample-4.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
libavresample-4.zip
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
NexusChecker.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
NexusChecker.exe
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
freebl3.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
freebl3.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
gkcodecs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
gkcodecs.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
libavresample-4.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
libavresample-4.dll
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
libavutil-56.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
libavutil-56.dll
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
libavresample-4.zip
-
Size
4.4MB
-
MD5
095b59d6465bf6491daccd0d4cf9baf0
-
SHA1
b5d488cf23c1a6e6e7cfaa777657f8ad9a87ec32
-
SHA256
35155e8468c1287a21e03699a55325378001fa060ee79a1db8f5b02e82adc33d
-
SHA512
8aa151f915a6d2190246d0000ab5d2a27646fd925522cb334fb7273e93135c1becf4fd19980afccaf5730d5d178889a1b52acb012814ac6fc16dcb4dd781ef29
-
SSDEEP
98304:c8luglqUM5DjX1SUeQAbWSFhMDC//X3yV8:/l4ZjFSpQAb1hK6c8
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
NexusChecker.exe
-
Size
605.6MB
-
MD5
2ba4db56200d2b07505c1eff5faed706
-
SHA1
5cf6b2fcd1fd2f93a324151f86b124ea2bb94dd6
-
SHA256
543fee52f65842ef6397ceca2b2516785103e93aecc58d340360ee76260684fa
-
SHA512
59873ce651896d3a3fc11656b3e3a1e56b94be13bf7244521c29194d75517514325765a00e1da9189b15dd291b09b5fb43509d61599c4ea0fe77a053c5f988b1
-
SSDEEP
49152:lNjqYcOatzfsFfG/oDx4tDhdLDG15f9pTo0trQyYxQw:lNjFcOaxYG/M43HA5fVt8Q
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
freebl3.dll
-
Size
845KB
-
MD5
662847f88f937be3b0e262891f3d7cb0
-
SHA1
5bb6b578064308fc39eb5a69c02ea893d4fdc037
-
SHA256
2eaded431adbfc17df0bb75d2706d527d14038f1f63aa85b41e2434ca3da9448
-
SHA512
4efefa4df931fa4c1d982947966cb3e80a5a4a932877ba41234ccb7ed1a69fe7ae183bd172dcd1a969d5f7572e12f380f4c3aab6078b7971764afb72e23af145
-
SSDEEP
12288:21wJLtapx8ThpZiwkeumCcN9XraJbJRPgUiZLoqnhhey:2KLtaATht7umCcN9XmJbJFriS+hhp
Score1/10 -
-
-
Target
gkcodecs.dll
-
Size
462KB
-
MD5
5b11259c1f70f005cc3138d076bc463f
-
SHA1
b3d8355d0e805ef251e5639a411f815c25b1cbcf
-
SHA256
50d8319352761bce751bb54c0a3d295691612b5b5a8fcfe687f1f6e690d0604d
-
SHA512
8b0b78d5bfc034dfa1d3d237842f3ddc1638bb72292c3eb72748ab398ea5670a3703ecae7324262705b304cba7c28cb5d264316d747f480b68cf25bdfecb1aa5
-
SSDEEP
12288:Ow2BLenEPdBA0BHCwyhleRMDgSx/FLZvb3kN:OLBMCDA0BCwyhleRMjx/FZc
Score1/10 -
-
-
Target
libavresample-4.dll
-
Size
578KB
-
MD5
43a5181dbc20f32106f44d9d493069c1
-
SHA1
7f8d85c35f9d2af64c31050bda616743a9f6fe5b
-
SHA256
69080064d63fa9724960c58767fde0a8202c101704241f0787f13359cc8eaa88
-
SHA512
e85efc93b1746ff141e5f158db6fe7f314e2fe488581d0442733af36d2fcfbbd458522d327a38abc0ae20e55b2fbc7dd8ba54aaf7dbe9dc8c7439a9fea436ad2
-
SSDEEP
12288:ox+wa4fcKToINMyVZBJm5QsW8N/raVikaNs1+gzPzjR/+ozEjLZvoSy7:dKzjRmvoN7
Score6/10-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
-
-
Target
libavutil-56.dll
-
Size
1.2MB
-
MD5
7cdeb2075bde3b7cd500e50e87d291f1
-
SHA1
7860db250f2cefb8e14cf8631a342d7cd489bba4
-
SHA256
ca3b5aa8a79edeed61d7526e44b68c6968f15e074a0f767cf6cbfc148dfbf8c4
-
SHA512
cc85f35454e8533e604da9296dfb74c27a6ed24b45b621fcaa308951a43dd83ff7a0f351f8930c9874920475ea13486010b01ee8712aee19cc9603e5da8b0eca
-
SSDEEP
24576:JeNaqLQN99oBo9BmGTwWW1Ih2QQ4vROb46yk/5WA/:JeNJC9ko9BmGTBw4NGsO
Score3/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Virtualization/Sandbox Evasion
1Discovery
Browser Information Discovery
1Network Service Discovery
1Peripheral Device Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
8System Information Discovery
11System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1Virtualization/Sandbox Evasion
1