General

  • Target

    SaintedV2.exe

  • Size

    10.9MB

  • Sample

    240922-aldrvasdkf

  • MD5

    186a78d1a2e978ab7c3c2cb20593b43f

  • SHA1

    2fbb539470842448133bd635ddbb013f089195ec

  • SHA256

    3dc9d0171b42daf90e93b60a7f5499e8d0ef8d9de3d398db3ea009ef0ea394bb

  • SHA512

    ac9ec7d43e48b5f506d3026831cb87c854764f843beb2f108493b0de9e09223d47f369ffddfe3dcf690881a44bd8267a8c919917b46a05437cd7374e3bdc5fcf

  • SSDEEP

    196608:C06PAjJb3tQk5tieNvX+wfm/pf+xfdkRNyTlKsnkrwWOtW0DaF1H:nj7v5ttvX+9/pWFGRKAsnkrwWIRajH

Malware Config

Targets

    • Target

      SaintedV2.exe

    • Size

      10.9MB

    • MD5

      186a78d1a2e978ab7c3c2cb20593b43f

    • SHA1

      2fbb539470842448133bd635ddbb013f089195ec

    • SHA256

      3dc9d0171b42daf90e93b60a7f5499e8d0ef8d9de3d398db3ea009ef0ea394bb

    • SHA512

      ac9ec7d43e48b5f506d3026831cb87c854764f843beb2f108493b0de9e09223d47f369ffddfe3dcf690881a44bd8267a8c919917b46a05437cd7374e3bdc5fcf

    • SSDEEP

      196608:C06PAjJb3tQk5tieNvX+wfm/pf+xfdkRNyTlKsnkrwWOtW0DaF1H:nj7v5ttvX+9/pWFGRKAsnkrwWIRajH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Target

      Stub.pyc

    • Size

      876KB

    • MD5

      e3b59149a029557d774fc09874c366f3

    • SHA1

      b9ae5008711b77f720685364879efb7b3e03f263

    • SHA256

      f265a5dbdae6716add53c2e3b71033753c837fd676704ad030ff20a5ba6d975d

    • SHA512

      f3e301660538552ca023a90494d900f62712d7f211fc529ab651af1204fd8c3174bbeeac5dc57b63e7705dff154d9d95ec4632f036a30a08eeb736f5e547eb48

    • SSDEEP

      24576:8X7m2uZNPAUjuawX4FZiYsiTupR2DjTJx86:kdXMPqa86

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks