General

  • Target

    MinecraftLauncher (1).exe

  • Size

    10.9MB

  • Sample

    241019-cfwrkszgke

  • MD5

    ba50f1deb0978655800c3b45951874f3

  • SHA1

    ff328b42d3c4cc86fb8b71584ac90efb5a77bbd5

  • SHA256

    3938f1243f80a435717fec25900af077f5d721d27c3ac16f53dbd1e810090bd3

  • SHA512

    8de071d66cd28d9478fb7744cb7ea790b1a750d73c1be235b421a7914aeaa55ef596321d5b53e18e7fd674389bd6f638e381b6a41c6e3b0563f9df17394d83f7

  • SSDEEP

    196608:3ShKAObq/TLx4hz7DIxyueNt+wfm/pf+xfdkRMMGWKqrIWOY/WKDaqkH:CXObsTGz7kQt+9/pWFGRMMGBqrIW97aL

Malware Config

Targets

    • Target

      MinecraftLauncher (1).exe

    • Size

      10.9MB

    • MD5

      ba50f1deb0978655800c3b45951874f3

    • SHA1

      ff328b42d3c4cc86fb8b71584ac90efb5a77bbd5

    • SHA256

      3938f1243f80a435717fec25900af077f5d721d27c3ac16f53dbd1e810090bd3

    • SHA512

      8de071d66cd28d9478fb7744cb7ea790b1a750d73c1be235b421a7914aeaa55ef596321d5b53e18e7fd674389bd6f638e381b6a41c6e3b0563f9df17394d83f7

    • SSDEEP

      196608:3ShKAObq/TLx4hz7DIxyueNt+wfm/pf+xfdkRMMGWKqrIWOY/WKDaqkH:CXObsTGz7kQt+9/pWFGRMMGBqrIW97aL

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      Stub.pyc

    • Size

      874KB

    • MD5

      57394fcc257fc5f36dff17fa33efede4

    • SHA1

      7359ffc5ee7afb4444fd252e1b1c756367ad58b0

    • SHA256

      ab202ba4f7d5bad3eb8f28c3f4ddaf936644efd8aafbd0d221b753939e4eb164

    • SHA512

      93c30a9836d3a4834d2b17f82e10be13fbb47ea5343ca8545d99d7168569f6409f900fe5b17db4891a7734a785e45a72346f3cce3b1436ddf88237d99e9cf781

    • SSDEEP

      12288:TuEQjPNZEmqr7LigkS5QFQXk9ryvKiIWbhEJxtOUQ9Gf6JYLIdZSNy4sWk4H0NmX:TuEtbr7a0oyvUxJxkgf6LkbsWfHW2D

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks