General

  • Target

    SecuriteInfo.com.Win64.Evo-gen.11830.19095.zip

  • Size

    10.4MB

  • Sample

    241028-ygckzswapd

  • MD5

    ac12dc33bb2e1fd45c9cdafb9711a6e0

  • SHA1

    42084ab8692b7f56c2e19c96c89d014b81139c1a

  • SHA256

    76a08578b6971eaa69435a3ce44356f9a0f852590f0bf4736013896a046a5658

  • SHA512

    e374e5364f005afc85137719aed22302563f012520ff1d1977dd5ed416795f6e3e7ba29eefaa3a8afd314b0b36a29966ea9c269538a26aaa892581f7c351ba08

  • SSDEEP

    196608:RgUo1/kotrr+NLZi8Qe+oEPEh2r6Gnvyya4PoQSJB6oUBrKkbenNw/Qtfz5SBD5+:BoBkoBaNLg8Qpoz2r6Eyya4PHSX6CkaB

Malware Config

Targets

    • Target

      SecuriteInfo.com.Win64.Evo-gen.11830.19095

    • Size

      10.5MB

    • MD5

      7fffe8702479239234bce6013bcad409

    • SHA1

      ee7aaecaeff869350ead69c907b77d5b0afd3f09

    • SHA256

      7870eda6f78bde1ea7c083ddf32a9aabd118b30f6b8617f4b9e6625edba0ff95

    • SHA512

      8d5932d1fa8006c73e8576383425151439b4bf4637017f104a6c4e5cf202ce1c4a1dbec6d61adb794fd8a30c1300d6635d162df8630f9193c96239ec8b2a6869

    • SSDEEP

      196608:F2f7uyka/QRjnlhNitMYQRs53WiJ4HO7tyc95Gwp+IUos1Ak+rqBdS4Kcm6PJ:F2FEj3omDRs9peutycqOye2H/KclPJ

    • Detects Monster Stealer.

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Monster

      Monster is a Golang stealer that was discovered in 2024.

    • Monster family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.