General

  • Target

    AutoWizard.exe

  • Size

    38.3MB

  • Sample

    240919-xzqd5awapf

  • MD5

    8ef2804f01784e97957a16ca44dc41bf

  • SHA1

    6438f214cb5c1e09d136b94f0b4717db063d0993

  • SHA256

    c1b9767756e0c85dd2a04013e53cb97817a055135fde76046871279297addcfd

  • SHA512

    a2db781b83e978e8fe1328a0806b4728015de93b433b0ee7b527299f57db29a19fbe8d262011c2c6d68df4b3cac270ed06d0e1d7f5e97392e27ee4e72c6659ef

  • SSDEEP

    786432:nLlhB4VtKoI5m4F21NglZqYljcTCgoMJ5Ux3KKCYe7+mYsv9S5X3NB:L0tKoq21Qt4CJvAKCYe7+Go5n

Malware Config

Targets

    • Target

      AutoWizard.exe

    • Size

      38.3MB

    • MD5

      8ef2804f01784e97957a16ca44dc41bf

    • SHA1

      6438f214cb5c1e09d136b94f0b4717db063d0993

    • SHA256

      c1b9767756e0c85dd2a04013e53cb97817a055135fde76046871279297addcfd

    • SHA512

      a2db781b83e978e8fe1328a0806b4728015de93b433b0ee7b527299f57db29a19fbe8d262011c2c6d68df4b3cac270ed06d0e1d7f5e97392e27ee4e72c6659ef

    • SSDEEP

      786432:nLlhB4VtKoI5m4F21NglZqYljcTCgoMJ5Ux3KKCYe7+mYsv9S5X3NB:L0tKoq21Qt4CJvAKCYe7+Go5n

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks