General

  • Target

    ElectronV3.zip

  • Size

    37.5MB

  • Sample

    241028-yamsdatkbk

  • MD5

    d23729c9d203a5d136f71403cb08623d

  • SHA1

    0e9b5810900923caa88f2cc9d8f101384ccd3c93

  • SHA256

    c2939db0f1eec1145c7b6d6effc192b7f5f1d6e4d3383110ad853449397f109d

  • SHA512

    3166c1561f4991a54e33ee1ee4d63d47fd02ad7c7b338efe58ced086662298b7db18e6ded34d97a07d393165a3c62ab8879b8a30aafb14f462d3e485b2c2919a

  • SSDEEP

    786432:76Q0Xiq6zWRsr1lkFHo93HnQJyQ60ah2onFJ00Xa01cJftEzM9lPaTRk:7tzWOs2FJh2MJT1af6caTRk

Malware Config

Targets

    • Target

      ElectronV3.zip

    • Size

      37.5MB

    • MD5

      d23729c9d203a5d136f71403cb08623d

    • SHA1

      0e9b5810900923caa88f2cc9d8f101384ccd3c93

    • SHA256

      c2939db0f1eec1145c7b6d6effc192b7f5f1d6e4d3383110ad853449397f109d

    • SHA512

      3166c1561f4991a54e33ee1ee4d63d47fd02ad7c7b338efe58ced086662298b7db18e6ded34d97a07d393165a3c62ab8879b8a30aafb14f462d3e485b2c2919a

    • SSDEEP

      786432:76Q0Xiq6zWRsr1lkFHo93HnQJyQ60ah2onFJ00Xa01cJftEzM9lPaTRk:7tzWOs2FJh2MJT1af6caTRk

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      ElectronV3/ElectronV3.exe

    • Size

      37.8MB

    • MD5

      1b7aed3da008408d116fe4cc4a4f2c1f

    • SHA1

      b93a3c16961251da8b1a02a42dd4150547923043

    • SHA256

      583082503369d4f22277889a3cf2cf0f7444896049d11389372fb1edc4d596c7

    • SHA512

      77ee5c88e1da17d5d2a8496f494d33165e1685f2db6965c7886ff3374a3ab83716bb89b242c9b5d2186e7450ee816bf97f43e12e248b513cccca30889a7cc1fa

    • SSDEEP

      786432:5mG/Q46tKTcvjFERlU9jZ96nEScQMnycTbl8KH+4N2997K4rv3Fqbj:YrK4e8NHnyClHNc9GUqbj

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks