General

  • Target

    ElectronV3.exe

  • Size

    25.9MB

  • Sample

    240912-zslhpsvdjf

  • MD5

    915c2a21d534014de05f015d0cd24ffa

  • SHA1

    206f5b6fc90a621b8f4a772a2aebaec27f3ab879

  • SHA256

    658bb6dc4e254882f8eef5d9a58b9f61fcbf815b2f6a08b86bc36636bed9cfef

  • SHA512

    8d2a89fa28f658c34539a828116c42a97e294e49ed8dddd69c2398147cf638e80e1caccdab10f85309d2a094b534e0f911c1e8b614071230602036f5314bb605

  • SSDEEP

    196608:fp/Ew9t2PAymtSHeNvX+wfm/pf+xfdkRDjHKsn2ruOZW0D+qI:B/Ew9NVtSUvX+9/pWFGRnqsn2ruIR+t

Malware Config

Targets

    • Target

      ElectronV3.exe

    • Size

      25.9MB

    • MD5

      915c2a21d534014de05f015d0cd24ffa

    • SHA1

      206f5b6fc90a621b8f4a772a2aebaec27f3ab879

    • SHA256

      658bb6dc4e254882f8eef5d9a58b9f61fcbf815b2f6a08b86bc36636bed9cfef

    • SHA512

      8d2a89fa28f658c34539a828116c42a97e294e49ed8dddd69c2398147cf638e80e1caccdab10f85309d2a094b534e0f911c1e8b614071230602036f5314bb605

    • SSDEEP

      196608:fp/Ew9t2PAymtSHeNvX+wfm/pf+xfdkRDjHKsn2ruOZW0D+qI:B/Ew9NVtSUvX+9/pWFGRnqsn2ruIR+t

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks