General

  • Target

    Boostrapper.exe

  • Size

    44.7MB

  • Sample

    240927-1wyg4s1hnm

  • MD5

    f43880dad3c258bf47254e2a10adcbc1

  • SHA1

    9916d409b18cdbf91a4bb972ab493910f6c77f5d

  • SHA256

    178d8cd0eb9d700b9be8f4b37e4380522af0dd950ae858bb2c79aeb10a71a84a

  • SHA512

    1bf1ac13c435a1accc78a57cb1b69a97ced1a6ff632b508f03f8e455292a08d360f2a05443a30cd2d643100ed4a1b36f4acb3ff0dd2127d75fb7554d34fad79e

  • SSDEEP

    786432:a9AOQTL1qSHqdc1Yd72r5JbTiumfSfz+EvbJESWqEp+0/pW/UyTo6:MAOQTzHZgs5xTivfSffvb6qrSaU4o6

Malware Config

Targets

    • Target

      Boostrapper.exe

    • Size

      44.7MB

    • MD5

      f43880dad3c258bf47254e2a10adcbc1

    • SHA1

      9916d409b18cdbf91a4bb972ab493910f6c77f5d

    • SHA256

      178d8cd0eb9d700b9be8f4b37e4380522af0dd950ae858bb2c79aeb10a71a84a

    • SHA512

      1bf1ac13c435a1accc78a57cb1b69a97ced1a6ff632b508f03f8e455292a08d360f2a05443a30cd2d643100ed4a1b36f4acb3ff0dd2127d75fb7554d34fad79e

    • SSDEEP

      786432:a9AOQTL1qSHqdc1Yd72r5JbTiumfSfz+EvbJESWqEp+0/pW/UyTo6:MAOQTzHZgs5xTivfSffvb6qrSaU4o6

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      loader-o.pyc

    • Size

      5.8MB

    • MD5

      3b750eb515bb762fadc05d5b31982f75

    • SHA1

      e8c8e23d3f259182e268432d57d05816a18ef14d

    • SHA256

      ff761ecda9a3837f08d19ad2a28e594cd0f070f5eea3549f3b5a319bff412fe5

    • SHA512

      b84b3a15a8626e6e5b80a0dfb4faca283d59c035407426024d9cdacd0a987b11d2a181bebe26158981e35d4133877828b901e7ab496fe444f3ba905882a94295

    • SSDEEP

      3072:E9ZmmGl7jek/8IAkG5soV8/fj58bpSz9nBMtdZaFqISj9W+d7sI1fNOvoM5EdHNL:CsUl

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks