General

  • Target

    Adobe Pro Viewer v2.13.0.zip

  • Size

    2KB

  • Sample

    240917-nf4mzazfjc

  • MD5

    d1e1a5a1dd04befc0983591965469187

  • SHA1

    4d50061300a9ff3a3029d449e20a5b6b28504a93

  • SHA256

    f616ed3a651b902c82adecf289e0d9c03c02074dc88ca5bcac6a34e571cbb82f

  • SHA512

    aa5213a235510fbee33e6adf066810be54491a63c5ea11fab40b5e0ddd9226c21037decb7f1c705544e1794e9c87856f461717e54a21e950c7d2b3082fbd99ae

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://bulletenergyllc.homes/deejay/adobe.exe

Targets

    • Target

      Adobe Pro Viewer v2.13.0/Adobe viewer plugin v 2.13.0.bat

    • Size

      981B

    • MD5

      55441f54cefe60f02b21640c5dbe9302

    • SHA1

      e1c37e59d06151d02965bce54a39737e3ccd8520

    • SHA256

      f282ea180ce6d32f11b086780ae1425336aebad1d0a98170f19f629703ddb941

    • SHA512

      6f6c7ccaf694ae01a0b3feead5a715f1a2f3b3f0516d0dd63e81e90b22d0629b2c7f1c33b9a434fe0f652559d1bd65e8c7728307895094ed7b7038c7398b9ef3

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks