General

  • Target

    Pedro_Robux.exe

  • Size

    39.1MB

  • Sample

    241008-s7qbwaxcpe

  • MD5

    6365ba95697f9fa8affdeb8fd116e14b

  • SHA1

    c6f09b62080c2df01cf2d79ee647f86a586b6f4b

  • SHA256

    83901384cee0c937e1955b81f69635caec5358d2267ab996fd12ad54f9d1e1f3

  • SHA512

    b493dc529256c04029117b43c05f9b9262615ecd3579dc3df3ba6cda0ac666d67ad45131a0a768407385bb0341f2d16da93cd74eedee8ae345c17f4ad887087f

  • SSDEEP

    786432:3x+yunjmpikrbcW9rp3AryPARxVZDhxMW23tdybpc:MGxbcehAryPARNDhxr23tdo

Malware Config

Targets

    • Target

      Pedro_Robux.exe

    • Size

      39.1MB

    • MD5

      6365ba95697f9fa8affdeb8fd116e14b

    • SHA1

      c6f09b62080c2df01cf2d79ee647f86a586b6f4b

    • SHA256

      83901384cee0c937e1955b81f69635caec5358d2267ab996fd12ad54f9d1e1f3

    • SHA512

      b493dc529256c04029117b43c05f9b9262615ecd3579dc3df3ba6cda0ac666d67ad45131a0a768407385bb0341f2d16da93cd74eedee8ae345c17f4ad887087f

    • SSDEEP

      786432:3x+yunjmpikrbcW9rp3AryPARxVZDhxMW23tdybpc:MGxbcehAryPARNDhxr23tdo

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks