General

  • Target

    Frozen Bots.zip

  • Size

    45.2MB

  • Sample

    241011-qb4hhsyejq

  • MD5

    0da178c028fcc82ef670d88fb67449d3

  • SHA1

    af1ca291dad5f0966a23c3d59b236d26732546bf

  • SHA256

    b5d40ab9cf0738463ffb27753209a30c0e1770863c709f41cbddb085bd59cf8f

  • SHA512

    9657eabf26b6422e4228976b7dc714a81a0fbb8eeff0c3229f40d130594ceb7a8fce957a2879c233001a895c55feb5b595104ed406fecf636c25451f33e9f366

  • SSDEEP

    786432:DCin0Zv2aav3YdewAbGjTLnxcrhnS0D56Fo9EwNvPfzRicxzck02bp2+Luz:DCin6v2aEIdaGLn+9S0dt91ZrRf1mo9+

Malware Config

Targets

    • Target

      Frozen Bots.zip

    • Size

      45.2MB

    • MD5

      0da178c028fcc82ef670d88fb67449d3

    • SHA1

      af1ca291dad5f0966a23c3d59b236d26732546bf

    • SHA256

      b5d40ab9cf0738463ffb27753209a30c0e1770863c709f41cbddb085bd59cf8f

    • SHA512

      9657eabf26b6422e4228976b7dc714a81a0fbb8eeff0c3229f40d130594ceb7a8fce957a2879c233001a895c55feb5b595104ed406fecf636c25451f33e9f366

    • SSDEEP

      786432:DCin0Zv2aav3YdewAbGjTLnxcrhnS0D56Fo9EwNvPfzRicxzck02bp2+Luz:DCin6v2aEIdaGLn+9S0dt91ZrRf1mo9+

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks