Resubmissions

10-11-2024 18:34

241110-w7wqfavrgp 10

05-11-2024 18:00

241105-wlnspswgkp 10

General

  • Target

    vm.spoofer.rar

  • Size

    12.6MB

  • Sample

    241110-w7wqfavrgp

  • MD5

    d7284c837c00a754eb1b0ca456982ce9

  • SHA1

    43514e3b6e1d78bef0498a3d469d779cd1a94e3d

  • SHA256

    64896cf157af46d6f6047ba3c9af1100b46bf759a8f42b11e0be242a7addc8d6

  • SHA512

    9c26e42734816e8a5833ca20e20ab566fb5211c054ceb5e34adcc3adf8f1bfb14b7e93d8a0f9e304d25943e7cf6c220a5fd19a885490c7782895b746058eaa62

  • SSDEEP

    393216:hp04bbe2WvcgjxeVVyGkultjDLSGNgOlDgPxZ:T93ehjxe2G7lVLS7Ol4Z

Malware Config

Targets

    • Target

      vm.spoofer (2).exe

    • Size

      12.9MB

    • MD5

      df104402ba4fc36be4e8e371c9c83418

    • SHA1

      14264d2bb658299945600dec428f1775cf95b280

    • SHA256

      dbd839daf0a21e4a8226f7ccd54664777180293782693efc5141103c94a173d7

    • SHA512

      946df09a44ae8c7047333830944bd9416b8b96e2cd2c3539b3b3319196bedaa72155f1f3cc82071e11493a17418428b5049e5223e70de15008d18b1fc1360953

    • SSDEEP

      393216:gkOSmutByxjgK+9/pWRGRW0GePWm7vj/mHKCAH:gtSmutAjgK+9/pWmvHt

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks