General

  • Target

    c83563592581c4544e7ed495cb17dda5.bin

  • Size

    10.7MB

  • Sample

    241029-b6jz2azmgk

  • MD5

    02db2403260c7051af576218eb83047e

  • SHA1

    c892d29923b7c6722136cf4d1db99044e62bab3f

  • SHA256

    40b6128bca00db48260f846f37bc57498f2dfe7b3c3a3aa3fed032000d62d639

  • SHA512

    b790f95c3eed968dcffc978fb10ff1723df65d38ef88f8e3f57ef47b26af493cc01b92f8c7c2a61ff543bababcc2d4dbbac7c04e7bddcf4a0ddb743e6f9baab5

  • SSDEEP

    196608:hLCL2IhChC0C9I9ZGfrX/ZYkQftheKhwSXOx+oSCpxFq1jxR1o/19d:S2ImC0FsfbikiheK8x+opGx7o/x

Malware Config

Targets

    • Target

      27450801afc63f56296f01c911375f6d216f1a100f4075c45cba369c834a413d.exe

    • Size

      10.9MB

    • MD5

      c83563592581c4544e7ed495cb17dda5

    • SHA1

      d9e8278c0ca87bb136b3c4f73086a685a1716f58

    • SHA256

      27450801afc63f56296f01c911375f6d216f1a100f4075c45cba369c834a413d

    • SHA512

      06469650b985a9957cbb3ae6f49422c9a54b610bb2593794223a525bac6e3ee74e898b314113c24e1839d7d749dfb5047ca5de57f5ba35f91fd94a218bf89668

    • SSDEEP

      196608:LcnKASm9cemXyuSyTde8zveNK+wfm/pf+xfdkRKxKEr2WOHWKD39eH7:KSm/tByxjgK+9/pWFGRK0Er2W673MH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks