General

  • Target

    61c881908bdc8be9c8ee8e42728b6f116768ff2a4edd540e1d82a02c51fd6322.exe.bin

  • Size

    10.7MB

  • Sample

    241028-xqdnzasqdp

  • MD5

    231f199ed9540c2d1cbf4233be515988

  • SHA1

    99cbb7341dffb6925a88525ea82ca8cb0cbe10c9

  • SHA256

    61c881908bdc8be9c8ee8e42728b6f116768ff2a4edd540e1d82a02c51fd6322

  • SHA512

    be67e81655f3474b07af2c03497c31a6e6cb7d97801086ba8a9c410e3de7fb8c62ec6dc8935a9e5ae37bef48f5bec1799c551c3bf8354be58ec9dfba57121ff2

  • SSDEEP

    196608:UPAlP3Zobseq6ERnzeljovAlpbmVjHQLmcVZOfcvL2sTD:KCpoSvRnzeOvW6QLLiE

Malware Config

Targets

    • Target

      61c881908bdc8be9c8ee8e42728b6f116768ff2a4edd540e1d82a02c51fd6322.exe.bin

    • Size

      10.7MB

    • MD5

      231f199ed9540c2d1cbf4233be515988

    • SHA1

      99cbb7341dffb6925a88525ea82ca8cb0cbe10c9

    • SHA256

      61c881908bdc8be9c8ee8e42728b6f116768ff2a4edd540e1d82a02c51fd6322

    • SHA512

      be67e81655f3474b07af2c03497c31a6e6cb7d97801086ba8a9c410e3de7fb8c62ec6dc8935a9e5ae37bef48f5bec1799c551c3bf8354be58ec9dfba57121ff2

    • SSDEEP

      196608:UPAlP3Zobseq6ERnzeljovAlpbmVjHQLmcVZOfcvL2sTD:KCpoSvRnzeOvW6QLLiE

    • Detects Monster Stealer.

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Monster

      Monster is a Golang stealer that was discovered in 2024.

    • Monster family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks