General

  • Target

    ded95299f780dfbdbafd1be5d02792fcfe9023372551e1ac35401928699dd8e1.exe (2).zip

  • Size

    10.7MB

  • Sample

    241028-x1skwavhmn

  • MD5

    aaa10a40beaef9c32583b558144774f5

  • SHA1

    9b4d509677467590952a84cdbdf2d0b64122d10b

  • SHA256

    128175154a095b174196b81accddc79f41c6caa78a0c9dbf51f3f4f886f12fdd

  • SHA512

    e1d3512fa599c7afab1be0180bb5905e710973a864458145c5b580dc07ca12f401b4bd94e05934458266817f8f62e38ba831dec3ddfee494cc4c5ad10ce83560

  • SSDEEP

    196608:ReSvJpSpEnh8i/24K3nhffqCRHq0Ae2wQmim6Y5u/2bjDw7P7VmJ6mXOe0kOTPYz:Rgm/zUntfBRHjAZwkmDS2MPwJ/eBkOTk

Malware Config

Targets

    • Target

      ded95299f780dfbdbafd1be5d02792fcfe9023372551e1ac35401928699dd8e1.exe.bin

    • Size

      21.2MB

    • MD5

      e5a2fee622dc433b5648e97a25737cb5

    • SHA1

      de21e8cd63f043243805af8b28a5414442f36329

    • SHA256

      ded95299f780dfbdbafd1be5d02792fcfe9023372551e1ac35401928699dd8e1

    • SHA512

      9c54e25b0802c1eeac7499d027149638d454ae5bcb22f527f82e85d10d80c2b7167c7ef6903b29e96675f40aef1807600d01f6d1abc675d0eedc6da3919e0043

    • SSDEEP

      196608:m1UwyPA4mtSHeNvX+wfm/pf+xfdkR0ZWKsnarIWOzW0DaqkH:qUKvtSUvX+9/pWFGRiBsnarIWeRaDH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks