General

  • Target

    Bloxstrapv2.5.4.exe.zip

  • Size

    10.7MB

  • Sample

    241028-xvnpqssrap

  • MD5

    50690e3206fa904e3d1e8aed9e9c701d

  • SHA1

    306201eb592571972fc3ea350c6519d6908da745

  • SHA256

    8fa96717b2e98da1ae1d88e6da248d3891e5b36a9e1c72a293f8fc4b8c887540

  • SHA512

    ff88359172c1db8890803cca5c6f08f9e409c1a85c9258f7a9a4c3382ee36433b4415d02ada577360f8daf208a2f43a68f56783d18cda1de0008491ca6d466b7

  • SSDEEP

    196608:7fh9qWGicLi6tw2JlLaHKGGvT6NCzw6mPEhvl416DV6gqM5NzdNknBPb9W4W:7J9Tcly2baqGGGoz0PEhi1fgJTknlb94

Malware Config

Targets

    • Target

      Bloxstrapv2.5.4.exe.bin

    • Size

      10.8MB

    • MD5

      b53f36862e744e28c4ac56c5e1ce6df2

    • SHA1

      667f7433232fe43d3e27a68d0a220fe6e528bf20

    • SHA256

      07cad70651c18c17684c34622bef236d10918d3f884861bcb998ac714a007c90

    • SHA512

      51c9ccf8196fd2ef048eca722f08243b02900bd7db14eb7dee266822cbc570918d357891b39a2531f79a0d8614229dc6b7bfde1c9961bc2f7e23a0a1b22a7d1b

    • SSDEEP

      196608:Q8a+iJPA+Jb3tQk5tOeNvX+wfm/pf+xfdkRGZWKsnwrIWOzW0DaqkH:7a+l+7v5tRvX+9/pWFGRsBsnwrIWeRaL

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks