General

  • Target

    SecuriteInfo.com.Win64.Evo-gen.11830.19095.exe.zip

  • Size

    10.4MB

  • Sample

    241028-yf9jbstlfs

  • MD5

    d251014dd0107f63330bb980c7a3d050

  • SHA1

    1264553a9013c0e0c20acc0d415cffa45dec096a

  • SHA256

    44d415e086d8ca0c371b747e09afafda4501e7b82cfe5ff2d4c30825cf2ea98b

  • SHA512

    f036592680df3b22708f28895f08bd11d69282b066d191b14082244ad49377aa5507755ad70cd8ad0c945d10096e282451f59ef64abe3ad9b72710addd71a93d

  • SSDEEP

    196608:88w9AnLNzELMi8ZuzMqx2q/wfcHMrSRbhTlXarmiUbLPUJTmyuojyiRxHnp+8D7:8OxPZuzOjcHySRF4rmRr5tSyiRxb

Malware Config

Targets

    • Target

      SecuriteInfo.com.Win64.Evo-gen.11830.19095.exe.bin

    • Size

      10.5MB

    • MD5

      7fffe8702479239234bce6013bcad409

    • SHA1

      ee7aaecaeff869350ead69c907b77d5b0afd3f09

    • SHA256

      7870eda6f78bde1ea7c083ddf32a9aabd118b30f6b8617f4b9e6625edba0ff95

    • SHA512

      8d5932d1fa8006c73e8576383425151439b4bf4637017f104a6c4e5cf202ce1c4a1dbec6d61adb794fd8a30c1300d6635d162df8630f9193c96239ec8b2a6869

    • SSDEEP

      196608:F2f7uyka/QRjnlhNitMYQRs53WiJ4HO7tyc95Gwp+IUos1Ak+rqBdS4Kcm6PJ:F2FEj3omDRs9peutycqOye2H/KclPJ

    • Detects Monster Stealer.

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Monster

      Monster is a Golang stealer that was discovered in 2024.

    • Monster family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks