General
-
Target
Boostrapper.exe
-
Size
44.7MB
-
Sample
240927-1wyg4s1hnm
-
MD5
f43880dad3c258bf47254e2a10adcbc1
-
SHA1
9916d409b18cdbf91a4bb972ab493910f6c77f5d
-
SHA256
178d8cd0eb9d700b9be8f4b37e4380522af0dd950ae858bb2c79aeb10a71a84a
-
SHA512
1bf1ac13c435a1accc78a57cb1b69a97ced1a6ff632b508f03f8e455292a08d360f2a05443a30cd2d643100ed4a1b36f4acb3ff0dd2127d75fb7554d34fad79e
-
SSDEEP
786432:a9AOQTL1qSHqdc1Yd72r5JbTiumfSfz+EvbJESWqEp+0/pW/UyTo6:MAOQTzHZgs5xTivfSffvb6qrSaU4o6
Static task
static1
Behavioral task
behavioral1
Sample
Boostrapper.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
loader-o.pyc
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Boostrapper.exe
-
Size
44.7MB
-
MD5
f43880dad3c258bf47254e2a10adcbc1
-
SHA1
9916d409b18cdbf91a4bb972ab493910f6c77f5d
-
SHA256
178d8cd0eb9d700b9be8f4b37e4380522af0dd950ae858bb2c79aeb10a71a84a
-
SHA512
1bf1ac13c435a1accc78a57cb1b69a97ced1a6ff632b508f03f8e455292a08d360f2a05443a30cd2d643100ed4a1b36f4acb3ff0dd2127d75fb7554d34fad79e
-
SSDEEP
786432:a9AOQTL1qSHqdc1Yd72r5JbTiumfSfz+EvbJESWqEp+0/pW/UyTo6:MAOQTzHZgs5xTivfSffvb6qrSaU4o6
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
-
-
Target
loader-o.pyc
-
Size
5.8MB
-
MD5
3b750eb515bb762fadc05d5b31982f75
-
SHA1
e8c8e23d3f259182e268432d57d05816a18ef14d
-
SHA256
ff761ecda9a3837f08d19ad2a28e594cd0f070f5eea3549f3b5a319bff412fe5
-
SHA512
b84b3a15a8626e6e5b80a0dfb4faca283d59c035407426024d9cdacd0a987b11d2a181bebe26158981e35d4133877828b901e7ab496fe444f3ba905882a94295
-
SSDEEP
3072:E9ZmmGl7jek/8IAkG5soV8/fj58bpSz9nBMtdZaFqISj9W+d7sI1fNOvoM5EdHNL:CsUl
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
1System Information Discovery
5System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1