General

  • Target

    DiscordUpdater.exe.bin

  • Size

    13.4MB

  • Sample

    241028-x2ck2stjd1

  • MD5

    005fde5f811ac07038f903b45e50c444

  • SHA1

    875f56a8c6fe0a5cd7e435a6fde5598fe79d2a66

  • SHA256

    f83b1370f4760f7f9d72bd46c52c22ddf80259c4a0546df4dd12d47fc4d00adb

  • SHA512

    a9202ae58ec8c67e5a7eeb76c80c3bce1f4f9e1e14eac4fb98ad30bd7c70988aa1da442077bfa45e5b2fd5aaeb242cf9bc83b5f2fab30b906a0aab158ede1f7e

  • SSDEEP

    393216:BSpUTLfhJlQETSSvJjt1KKgUZnAbYkM3xy:wUTLJXQEWShBFtZAXGw

Malware Config

Targets

    • Target

      DiscordUpdater.exe.bin

    • Size

      13.4MB

    • MD5

      005fde5f811ac07038f903b45e50c444

    • SHA1

      875f56a8c6fe0a5cd7e435a6fde5598fe79d2a66

    • SHA256

      f83b1370f4760f7f9d72bd46c52c22ddf80259c4a0546df4dd12d47fc4d00adb

    • SHA512

      a9202ae58ec8c67e5a7eeb76c80c3bce1f4f9e1e14eac4fb98ad30bd7c70988aa1da442077bfa45e5b2fd5aaeb242cf9bc83b5f2fab30b906a0aab158ede1f7e

    • SSDEEP

      393216:BSpUTLfhJlQETSSvJjt1KKgUZnAbYkM3xy:wUTLJXQEWShBFtZAXGw

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks