General

  • Target

    robloxcondogenerator.exe

  • Size

    11.1MB

  • Sample

    241002-pey7jayhra

  • MD5

    15f72ecd53126d5529b2f3534f900cd4

  • SHA1

    654b3b229df0bd88c84a8f74d818c66404c9e48a

  • SHA256

    78f45071a2479d2035b7fa99c850d0eaf9f5b0082a100ea2f86e8b3708591f79

  • SHA512

    d534f278875458a24ed579dbe57d70b984bb593bc745919c88ce5110dfc7c054f3908173c34d57672eb1b6ad0482365f24db6480ca7810aa2e3e9ba6be507fa0

  • SSDEEP

    196608:TgcVmKAW8/TLx4hz7DIxyueNt+wfm/pf+xfdkRtWKqrIWOY/WKDaqkH:sXWSTGz7kQt+9/pWFGRtBqrIW97aDH

Malware Config

Targets

    • Target

      robloxcondogenerator.exe

    • Size

      11.1MB

    • MD5

      15f72ecd53126d5529b2f3534f900cd4

    • SHA1

      654b3b229df0bd88c84a8f74d818c66404c9e48a

    • SHA256

      78f45071a2479d2035b7fa99c850d0eaf9f5b0082a100ea2f86e8b3708591f79

    • SHA512

      d534f278875458a24ed579dbe57d70b984bb593bc745919c88ce5110dfc7c054f3908173c34d57672eb1b6ad0482365f24db6480ca7810aa2e3e9ba6be507fa0

    • SSDEEP

      196608:TgcVmKAW8/TLx4hz7DIxyueNt+wfm/pf+xfdkRtWKqrIWOY/WKDaqkH:sXWSTGz7kQt+9/pWFGRtBqrIW97aDH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks