General
-
Target
MinecraftLauncher (1).exe
-
Size
10.9MB
-
Sample
241019-cfwrkszgke
-
MD5
ba50f1deb0978655800c3b45951874f3
-
SHA1
ff328b42d3c4cc86fb8b71584ac90efb5a77bbd5
-
SHA256
3938f1243f80a435717fec25900af077f5d721d27c3ac16f53dbd1e810090bd3
-
SHA512
8de071d66cd28d9478fb7744cb7ea790b1a750d73c1be235b421a7914aeaa55ef596321d5b53e18e7fd674389bd6f638e381b6a41c6e3b0563f9df17394d83f7
-
SSDEEP
196608:3ShKAObq/TLx4hz7DIxyueNt+wfm/pf+xfdkRMMGWKqrIWOY/WKDaqkH:CXObsTGz7kQt+9/pWFGRMMGBqrIW97aL
Behavioral task
behavioral1
Sample
MinecraftLauncher (1).exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Stub.pyc
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
MinecraftLauncher (1).exe
-
Size
10.9MB
-
MD5
ba50f1deb0978655800c3b45951874f3
-
SHA1
ff328b42d3c4cc86fb8b71584ac90efb5a77bbd5
-
SHA256
3938f1243f80a435717fec25900af077f5d721d27c3ac16f53dbd1e810090bd3
-
SHA512
8de071d66cd28d9478fb7744cb7ea790b1a750d73c1be235b421a7914aeaa55ef596321d5b53e18e7fd674389bd6f638e381b6a41c6e3b0563f9df17394d83f7
-
SSDEEP
196608:3ShKAObq/TLx4hz7DIxyueNt+wfm/pf+xfdkRMMGWKqrIWOY/WKDaqkH:CXObsTGz7kQt+9/pWFGRMMGBqrIW97aL
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Stub.pyc
-
Size
874KB
-
MD5
57394fcc257fc5f36dff17fa33efede4
-
SHA1
7359ffc5ee7afb4444fd252e1b1c756367ad58b0
-
SHA256
ab202ba4f7d5bad3eb8f28c3f4ddaf936644efd8aafbd0d221b753939e4eb164
-
SHA512
93c30a9836d3a4834d2b17f82e10be13fbb47ea5343ca8545d99d7168569f6409f900fe5b17db4891a7734a785e45a72346f3cce3b1436ddf88237d99e9cf781
-
SSDEEP
12288:TuEQjPNZEmqr7LigkS5QFQXk9ryvKiIWbhEJxtOUQ9Gf6JYLIdZSNy4sWk4H0NmX:TuEtbr7a0oyvUxJxkgf6LkbsWfHW2D
Score3/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
1System Information Discovery
4System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1