General

  • Target

    f282ea180ce6d32f11b086780ae1425336aebad1d0a98170f19f629703ddb941.bat

  • Size

    981B

  • Sample

    240918-b67fbswenf

  • MD5

    55441f54cefe60f02b21640c5dbe9302

  • SHA1

    e1c37e59d06151d02965bce54a39737e3ccd8520

  • SHA256

    f282ea180ce6d32f11b086780ae1425336aebad1d0a98170f19f629703ddb941

  • SHA512

    6f6c7ccaf694ae01a0b3feead5a715f1a2f3b3f0516d0dd63e81e90b22d0629b2c7f1c33b9a434fe0f652559d1bd65e8c7728307895094ed7b7038c7398b9ef3

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://bulletenergyllc.homes/deejay/adobe.exe

Targets

    • Target

      f282ea180ce6d32f11b086780ae1425336aebad1d0a98170f19f629703ddb941.bat

    • Size

      981B

    • MD5

      55441f54cefe60f02b21640c5dbe9302

    • SHA1

      e1c37e59d06151d02965bce54a39737e3ccd8520

    • SHA256

      f282ea180ce6d32f11b086780ae1425336aebad1d0a98170f19f629703ddb941

    • SHA512

      6f6c7ccaf694ae01a0b3feead5a715f1a2f3b3f0516d0dd63e81e90b22d0629b2c7f1c33b9a434fe0f652559d1bd65e8c7728307895094ed7b7038c7398b9ef3

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks