General

  • Target

    7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a.exe.zip

  • Size

    10.7MB

  • Sample

    241028-xvmsfasran

  • MD5

    b9264b6d3b8d474a9ff2cd3fc9a13faa

  • SHA1

    3a6931e7c62885048ddc34c726f8bc8d5bf4949c

  • SHA256

    05f1cc22fd7c5a2466b60c8efa0f3ce02d7532354622dd32cfd4365a0e07e720

  • SHA512

    bac8ce4a4b38e7b50e06f7eee521fd9de9312b8ac551a3392a8a450e80fef3d43e34e69ccc8ae7367ce499e218d8674efa1304889c257ddc388c62aebeb0b5d9

  • SSDEEP

    196608:WhsiccY+1vxk1AO6Ff7B5Bo9s6tdxfAJu2msc8t0e6qFxhfFVeaQQZoJ:WhsiVY+0mV+xdxfN4c8tl6GhLeaQQZW

Malware Config

Targets

    • Target

      7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a.exe.bin

    • Size

      10.7MB

    • MD5

      f7f9d3c98351d9be736e7aafb3563561

    • SHA1

      1f60f25b4b8f3f38a9f40680289554216c2f9924

    • SHA256

      7bb30c9b75980b7bcd755d2d968077a2c8c582a0ca11e86ae9454d067182139a

    • SHA512

      fed3e1bb950d746f1ed4dffeb88259b2a6e8ad40afe161469e8b0cff7c70e40617d3ca1dffc2899d3ac35790d1817f1d54724ead5d5941d485c6c67070070a87

    • SSDEEP

      196608:es+j9q6y7PuZANMUgvUExd8zeiHf/jC51U7BlUdinrDRQF6f1:eNBly7Pum3gvizei/rMGBa4nr1jt

    • Detects Monster Stealer.

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Monster

      Monster is a Golang stealer that was discovered in 2024.

    • Monster family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks