General

  • Target

    vm.spoofer.rar

  • Size

    12.6MB

  • Sample

    241105-wdvw2svhma

  • MD5

    d7284c837c00a754eb1b0ca456982ce9

  • SHA1

    43514e3b6e1d78bef0498a3d469d779cd1a94e3d

  • SHA256

    64896cf157af46d6f6047ba3c9af1100b46bf759a8f42b11e0be242a7addc8d6

  • SHA512

    9c26e42734816e8a5833ca20e20ab566fb5211c054ceb5e34adcc3adf8f1bfb14b7e93d8a0f9e304d25943e7cf6c220a5fd19a885490c7782895b746058eaa62

  • SSDEEP

    393216:hp04bbe2WvcgjxeVVyGkultjDLSGNgOlDgPxZ:T93ehjxe2G7lVLS7Ol4Z

Malware Config

Targets

    • Target

      vm.spoofer.rar

    • Size

      12.6MB

    • MD5

      d7284c837c00a754eb1b0ca456982ce9

    • SHA1

      43514e3b6e1d78bef0498a3d469d779cd1a94e3d

    • SHA256

      64896cf157af46d6f6047ba3c9af1100b46bf759a8f42b11e0be242a7addc8d6

    • SHA512

      9c26e42734816e8a5833ca20e20ab566fb5211c054ceb5e34adcc3adf8f1bfb14b7e93d8a0f9e304d25943e7cf6c220a5fd19a885490c7782895b746058eaa62

    • SSDEEP

      393216:hp04bbe2WvcgjxeVVyGkultjDLSGNgOlDgPxZ:T93ehjxe2G7lVLS7Ol4Z

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      vm.spoofer (2).exe

    • Size

      12.9MB

    • MD5

      df104402ba4fc36be4e8e371c9c83418

    • SHA1

      14264d2bb658299945600dec428f1775cf95b280

    • SHA256

      dbd839daf0a21e4a8226f7ccd54664777180293782693efc5141103c94a173d7

    • SHA512

      946df09a44ae8c7047333830944bd9416b8b96e2cd2c3539b3b3319196bedaa72155f1f3cc82071e11493a17418428b5049e5223e70de15008d18b1fc1360953

    • SSDEEP

      393216:gkOSmutByxjgK+9/pWRGRW0GePWm7vj/mHKCAH:gtSmutAjgK+9/pWmvHt

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      Stub.pyc

    • Size

      875KB

    • MD5

      07d0844764c87a54283bee44be2c9a49

    • SHA1

      98df3eae95b2e876781769584227bc6f19a8e3f1

    • SHA256

      4e75ade8d0890e8228195a80ea21767368fe5da226f09a2bc1bfd943d004da15

    • SHA512

      7e655608fe47d644e561255507f8a960b5a9bdb94b29c00bd016fb293030d13db5fad06dfd5e417f9645242e56af8ebadd17eec073b4705bd95ed001a7ea7cd6

    • SSDEEP

      24576:V5zjx1WxKnEfF7QLAUos789H9dbK3DxEXcF7I:V5D8cD3sCxXI

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks