General
-
Target
Multitool Ms solution.exe
-
Size
13.5MB
-
Sample
241003-vfdvwazbne
-
MD5
e70c3661fb9c73502ffd42df9f135374
-
SHA1
dbb75031873467c16184db7a6e743277e5a1f001
-
SHA256
3cef3c12932c341f46c4e7a2dd39797ca12ffc78525d1202e9d432bede8ca496
-
SHA512
00235413131168e2caee85286867fb738b47d08b1900d99aa29beb567532df557cbe4b1befb9570e4f9b4855736b7c984360d4fd43120e6fbdcef0dad54dbaf6
-
SSDEEP
393216:CZygPYVnNSMb1+TtIiFUCuARuAkFXmb5Y1mWKKwC:CAgPQJ1QtIdCuA085YYVKF
Behavioral task
behavioral1
Sample
Multitool Ms solution.exe
Resource
win11-20240802-fr
Behavioral task
behavioral2
Sample
Stub.pyc
Resource
win11-20240802-fr
Malware Config
Targets
-
-
Target
Multitool Ms solution.exe
-
Size
13.5MB
-
MD5
e70c3661fb9c73502ffd42df9f135374
-
SHA1
dbb75031873467c16184db7a6e743277e5a1f001
-
SHA256
3cef3c12932c341f46c4e7a2dd39797ca12ffc78525d1202e9d432bede8ca496
-
SHA512
00235413131168e2caee85286867fb738b47d08b1900d99aa29beb567532df557cbe4b1befb9570e4f9b4855736b7c984360d4fd43120e6fbdcef0dad54dbaf6
-
SSDEEP
393216:CZygPYVnNSMb1+TtIiFUCuARuAkFXmb5Y1mWKKwC:CAgPQJ1QtIdCuA085YYVKF
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Stub.pyc
-
Size
873KB
-
MD5
069ee2de8ab73a00ee0c12d6937c1fee
-
SHA1
fc1a6d3b28a213ab926037e41fc9fd64484a9495
-
SHA256
4dc6f0527b420515c5def293b1bc7ad116717b3c4d1a378989a1515309499707
-
SHA512
4dcc89c9c49b0844d3e03f2a4afc4f28043488a87b35ceec77a0077b31292447ba29622ff00b7f0d1720926e81ef9cb78369c04216c89572752182efa9d792e3
-
SSDEEP
12288:uGsJcCbPdWreLqYyNolSHP0M4KZI9GX/seTVr5oo+Ikpv6P0cjLJ64QrqNGD8p:uzJxlWrVNr0M4KZI9GUuko+I70v4qtU
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1System Information Discovery
4System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1