General

  • Target

    SecuriteInfo.com.Win64.Evo-gen.11830.19095.zip

  • Size

    10.4MB

  • Sample

    241028-ygckzswapd

  • MD5

    ac12dc33bb2e1fd45c9cdafb9711a6e0

  • SHA1

    42084ab8692b7f56c2e19c96c89d014b81139c1a

  • SHA256

    76a08578b6971eaa69435a3ce44356f9a0f852590f0bf4736013896a046a5658

  • SHA512

    e374e5364f005afc85137719aed22302563f012520ff1d1977dd5ed416795f6e3e7ba29eefaa3a8afd314b0b36a29966ea9c269538a26aaa892581f7c351ba08

  • SSDEEP

    196608:RgUo1/kotrr+NLZi8Qe+oEPEh2r6Gnvyya4PoQSJB6oUBrKkbenNw/Qtfz5SBD5+:BoBkoBaNLg8Qpoz2r6Eyya4PHSX6CkaB

Malware Config

Targets

    • Target

      SecuriteInfo.com.Win64.Evo-gen.11830.19095

    • Size

      10.5MB

    • MD5

      7fffe8702479239234bce6013bcad409

    • SHA1

      ee7aaecaeff869350ead69c907b77d5b0afd3f09

    • SHA256

      7870eda6f78bde1ea7c083ddf32a9aabd118b30f6b8617f4b9e6625edba0ff95

    • SHA512

      8d5932d1fa8006c73e8576383425151439b4bf4637017f104a6c4e5cf202ce1c4a1dbec6d61adb794fd8a30c1300d6635d162df8630f9193c96239ec8b2a6869

    • SSDEEP

      196608:F2f7uyka/QRjnlhNitMYQRs53WiJ4HO7tyc95Gwp+IUos1Ak+rqBdS4Kcm6PJ:F2FEj3omDRs9peutycqOye2H/KclPJ

    • Detects Monster Stealer.

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Monster

      Monster is a Golang stealer that was discovered in 2024.

    • Monster family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks