Resubmissions
12-11-2024 03:23
241112-dxl45sxjbk 10General
-
Target
VytrixDuper.zip
-
Size
12.7MB
-
Sample
241112-dxl45sxjbk
-
MD5
bbadc655d26d8e97391bb1c2bc0450ad
-
SHA1
94e9183777d5a60a984faaa7563e9e7a0b47c7d5
-
SHA256
22905cd74085b5b80d07f0ec1cd0ed187400ac63e4601c0244317b60206ae0b7
-
SHA512
9e7e02e85a670ca7469aebd069812df6fa0cbe2c300897b76c938559c4fc1756e95162e5f84d25851e166836bece627cd03e740d3ecd9a76aac63cdd2a9ca9dc
-
SSDEEP
393216:rVjp/9SpZfeHvQmH7i3zqFCWsLhbauQUAK3V8Q:P/GZObi3Z5LYuV8Q
Behavioral task
behavioral1
Sample
Requirements installer.bat
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Requirements installer.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Source Code.py
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Source Code.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
VytrixDuper.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
VytrixDuper.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Requirements installer.bat
-
Size
579B
-
MD5
0731cb4896061c40bdab8f55ce5917c8
-
SHA1
e4862132209e887b39b3b39bcb0b359718b893a7
-
SHA256
13a491dcfdae51bc4ac63144b494932690ecbc5d99646b039e65ed26a141a5bc
-
SHA512
f76a0e38bbbdc18ccb77ca108e6d3eef3d4bb769bb2412c8533253658b45594cf37b8571417dd4d1671b51acf4508373af97db130bfd25e32a23ab6509307f84
Score1/10 -
-
-
Target
Source Code.py
-
Size
6KB
-
MD5
b8aa439871282435fe23e9fc8b982dc6
-
SHA1
3cd1425a62afbd2aa49fc528f4d9fac3d0cae728
-
SHA256
41cb1957be003b597652b9f97ae324366bea9992c2a4ffb88c4346999d54b7df
-
SHA512
ee78ddf1797f4338eb3269b56fa68270efe7a4cc80a234706eef4bc73b14376864513371dd3116f893fc6ac6a8e86c31b0434edd6ca89ba63a75174b5d6a0a55
-
SSDEEP
96:Xw1Tw/hL8s/cjbID/HWas5mNPKJ0GPafXcvwtozyJXgv3+YGMyFmnlsP:Aw/hL8s/cjO/H0mNPw8Xcvkoo4uBwlk
Score3/10 -
-
-
Target
VytrixDuper.exe
-
Size
22.8MB
-
MD5
d13ae015a085b21c90f987ed36574e2d
-
SHA1
2488d03a0b5f72153c89089536d8c2d27527e973
-
SHA256
c0a3974d6029fd96b68a40c3fe56c56868a1c68ef9a128ae7d9c24ddc5785c5b
-
SHA512
29e0d67b71ac7aec66de9b38edeea15159e50fa7a4d96925dc578ab5ae7f31509716a7b15eadb7e1eeb614762332ca95692eb423488912b3bd9bd28c6a07601c
-
SSDEEP
393216:uJ/+tByxjBIn8iK1piXLGVEgMv0XXsgyYWZBo:DtAjhDiXHjvmYBo
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1