General

  • Target

    27450801afc63f56296f01c911375f6d216f1a100f4075c45cba369c834a413d.exe.zip

  • Size

    10.7MB

  • Sample

    241028-xnsecavemg

  • MD5

    bc1010cb6c6bc687560a8980ddc821b1

  • SHA1

    3c723bf14517de6803016e8cfb65574d8895745a

  • SHA256

    d6b8760e3698e80a970b4b707801dcde3f3e974400f2fb6ed612ab4fe6bed079

  • SHA512

    eb0d71c02042413735da57cb54243a67813d0fac266b29d51df6b358d498599832b032647fdc215e9a7fbeabd14648f887dd43e72055b55d12a6703870066a87

  • SSDEEP

    196608:16rNZC8wGc91yHPYuzhE+Nl+RR8UdXCR+D6C/qIcG4WahYXo+LfbgNq:16K8HHATzuUdCR+pggXXo+7wq

Malware Config

Targets

    • Target

      27450801afc63f56296f01c911375f6d216f1a100f4075c45cba369c834a413d.exe.bin

    • Size

      10.9MB

    • MD5

      c83563592581c4544e7ed495cb17dda5

    • SHA1

      d9e8278c0ca87bb136b3c4f73086a685a1716f58

    • SHA256

      27450801afc63f56296f01c911375f6d216f1a100f4075c45cba369c834a413d

    • SHA512

      06469650b985a9957cbb3ae6f49422c9a54b610bb2593794223a525bac6e3ee74e898b314113c24e1839d7d749dfb5047ca5de57f5ba35f91fd94a218bf89668

    • SSDEEP

      196608:LcnKASm9cemXyuSyTde8zveNK+wfm/pf+xfdkRKxKEr2WOHWKD39eH7:KSm/tByxjgK+9/pWFGRK0Er2W673MH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks