General

  • Target

    66dc12a854b4e1dc8b1a4d3517eea56a04234ce13ed6aa4642921322928c96c2.exe.bin

  • Size

    11.7MB

  • Sample

    241028-xqk32ssrbt

  • MD5

    2e3c92b0fef03f9cf87c3dacd8bfe6dc

  • SHA1

    65fccf614953d38a454138daf8449ee824a37cf2

  • SHA256

    66dc12a854b4e1dc8b1a4d3517eea56a04234ce13ed6aa4642921322928c96c2

  • SHA512

    0f037ed603392f718664dfd8465cc57642d47f5fea85f3e06fe0c4f235f91f76ebc8a7e70e23ac388cffcdd85e49051542d5ea0a12cd4f0242b6fccdfef699b9

  • SSDEEP

    196608:NfDFV4lFoxZupaiSrZOH+eWRIStQvbd4r/JdsEKR+4WUAofZXDO1iUjGgKJ:NrsMTroHyRIzvbqroFR+4WDofZXD25Gv

Malware Config

Targets

    • Target

      66dc12a854b4e1dc8b1a4d3517eea56a04234ce13ed6aa4642921322928c96c2.exe.bin

    • Size

      11.7MB

    • MD5

      2e3c92b0fef03f9cf87c3dacd8bfe6dc

    • SHA1

      65fccf614953d38a454138daf8449ee824a37cf2

    • SHA256

      66dc12a854b4e1dc8b1a4d3517eea56a04234ce13ed6aa4642921322928c96c2

    • SHA512

      0f037ed603392f718664dfd8465cc57642d47f5fea85f3e06fe0c4f235f91f76ebc8a7e70e23ac388cffcdd85e49051542d5ea0a12cd4f0242b6fccdfef699b9

    • SSDEEP

      196608:NfDFV4lFoxZupaiSrZOH+eWRIStQvbd4r/JdsEKR+4WUAofZXDO1iUjGgKJ:NrsMTroHyRIzvbqroFR+4WDofZXD25Gv

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks