General

  • Target

    7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a.exe (1).zip

  • Size

    10.7MB

  • Sample

    241028-xryqjavfjc

  • MD5

    a4fccbaa67c3582391e582b2aa87d5ed

  • SHA1

    751738742e0b8844fd52c4de077ce79a40ff19b3

  • SHA256

    ab26c4fcaf21c8105119447ee81f3e00b480d9ef25b956a0bf09b0b2c0cc6072

  • SHA512

    def5c923315c30e1439136fed548085b5996173bf8e747d025b9cfd7ea6cfa982f322170e73c9ef09a95c0694e7fd72fd9d562ab405ace8f65469dd297b9353b

  • SSDEEP

    196608:lWJHMnFv+bBZde56LfvnVeLxOO17o9blraPtiXLg/ylZJAA7IcT24iO:lWJHMnFGbXdeYfSn1yda1F+JB7Z

Malware Config

Targets

    • Target

      7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a.exe.bin

    • Size

      10.7MB

    • MD5

      f7f9d3c98351d9be736e7aafb3563561

    • SHA1

      1f60f25b4b8f3f38a9f40680289554216c2f9924

    • SHA256

      7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a

    • SHA512

      fed3e1bb950d746f1ed4dffeb88259b2a6e8ad40afe161469e8b0cff7c70e40617d3ca1dffc2899d3ac35790d1817f1d54724ead5d5941d485c6c67070070a87

    • SSDEEP

      196608:es+j9q6y7PuZANMUgvUExd8zeiHf/jC51U7BlUdinrDRQF6f1:eNBly7Pum3gvizei/rMGBa4nr1jt

    • Detects Monster Stealer.

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Monster

      Monster is a Golang stealer that was discovered in 2024.

    • Monster family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks