General

  • Target

    Boostrapper.exe

  • Size

    10.9MB

  • Sample

    241106-bj59rasgqn

  • MD5

    83a760d4a41ba5a560f6f10e3b1fdedc

  • SHA1

    00d4bbb018fda8176c63dd73a40286e8ee6b8275

  • SHA256

    83c3541f0cb1030464369e223ba281b068157af9910515402857b08b5b9a6a39

  • SHA512

    a17a9b942e5db0824714675dd5ebf988e9a2930a1c4920d12442319a21066bd07a8d43f8a109f66433c05bb8853eda77c7876c7edac7f6842f07ba540e19622b

  • SSDEEP

    196608:0H57rBAYZPJb3tQk5tOeNvX+wfm/pf+xfdkRoTvKnruOLW0D+qI:2OYZP7v5tRvX+9/pWFGRwCnru8R+t

Malware Config

Targets

    • Target

      Boostrapper.exe

    • Size

      10.9MB

    • MD5

      83a760d4a41ba5a560f6f10e3b1fdedc

    • SHA1

      00d4bbb018fda8176c63dd73a40286e8ee6b8275

    • SHA256

      83c3541f0cb1030464369e223ba281b068157af9910515402857b08b5b9a6a39

    • SHA512

      a17a9b942e5db0824714675dd5ebf988e9a2930a1c4920d12442319a21066bd07a8d43f8a109f66433c05bb8853eda77c7876c7edac7f6842f07ba540e19622b

    • SSDEEP

      196608:0H57rBAYZPJb3tQk5tOeNvX+wfm/pf+xfdkRoTvKnruOLW0D+qI:2OYZP7v5tRvX+9/pWFGRwCnru8R+t

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks