General

  • Target

    61c881908bdc8be9c8ee8e42728b6f116768ff2a4edd540e1d82a02c51fd6322.exe.zip

  • Size

    10.7MB

  • Sample

    241028-xqgqmasqdq

  • MD5

    c357a1a59dea2fb5148622faf902b1d7

  • SHA1

    2bde020783966c67e41e8a14ae01f729fd08302b

  • SHA256

    e33a49717f54c875b796b7ac60bf802ce09320b78c8042004b039e81272808aa

  • SHA512

    ed455eb5e5193ed61be188adc4228ebcf30d3c2e23baed732804bcc3da4f4915799135cd7cb2cfbcdab9468e98162d95ea8cc9f80cd4f5f5b7dda0d76bec9984

  • SSDEEP

    196608:mge6SAvqfDZ6ZbEjud4uIRJPIIUv8kIceH2PyCrR2aEZdyj+e6blPILIPneU:m4SAvYDZMb4vgIZkWH2PyCrR2xZd5pfH

Malware Config

Targets

    • Target

      61c881908bdc8be9c8ee8e42728b6f116768ff2a4edd540e1d82a02c51fd6322.exe.bin

    • Size

      10.7MB

    • MD5

      231f199ed9540c2d1cbf4233be515988

    • SHA1

      99cbb7341dffb6925a88525ea82ca8cb0cbe10c9

    • SHA256

      61c881908bdc8be9c8ee8e42728b6f116768ff2a4edd540e1d82a02c51fd6322

    • SHA512

      be67e81655f3474b07af2c03497c31a6e6cb7d97801086ba8a9c410e3de7fb8c62ec6dc8935a9e5ae37bef48f5bec1799c551c3bf8354be58ec9dfba57121ff2

    • SSDEEP

      196608:UPAlP3Zobseq6ERnzeljovAlpbmVjHQLmcVZOfcvL2sTD:KCpoSvRnzeOvW6QLLiE

    • Detects Monster Stealer.

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Monster

      Monster is a Golang stealer that was discovered in 2024.

    • Monster family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks