General

  • Target

    TikBot.rar

  • Size

    10.7MB

  • Sample

    241012-3e72bs1fqj

  • MD5

    bbd228dbc6d7224418d6104c8570bf40

  • SHA1

    90ab57adad22f079915406b1afad7600d111dc22

  • SHA256

    ef3b88b1dc8c93348672196eecea033ebb3b626c7ba88283ee8bfc16ea1eaa39

  • SHA512

    92cd2574833feeb84e32b1b138b801fec0f0fff6a1550b0549727e1a251d66a64c2073c11227cd0af7d4b2dfd72a07bb44595b044e7d075fec16174de83841f8

  • SSDEEP

    196608:97mUW0Va7oQ8TIU2BxfvHyY/L0nmFkpv8LXEJjQ4thzG4VuJelsMtUaaZ+YOXNZp:hmR0VKo7Tf2ffPyY/Qnm2vTJjhhzG4Vb

Malware Config

Targets

    • Target

      TikBot.rar

    • Size

      10.7MB

    • MD5

      bbd228dbc6d7224418d6104c8570bf40

    • SHA1

      90ab57adad22f079915406b1afad7600d111dc22

    • SHA256

      ef3b88b1dc8c93348672196eecea033ebb3b626c7ba88283ee8bfc16ea1eaa39

    • SHA512

      92cd2574833feeb84e32b1b138b801fec0f0fff6a1550b0549727e1a251d66a64c2073c11227cd0af7d4b2dfd72a07bb44595b044e7d075fec16174de83841f8

    • SSDEEP

      196608:97mUW0Va7oQ8TIU2BxfvHyY/L0nmFkpv8LXEJjQ4thzG4VuJelsMtUaaZ+YOXNZp:hmR0VKo7Tf2ffPyY/Qnm2vTJjhhzG4Vb

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks