General

  • Target

    SOSA_CARD_GEN.exe

  • Size

    39.5MB

  • Sample

    241124-rrysmszmhm

  • MD5

    39774c3b7261ed87aad4d8d8372a0faa

  • SHA1

    39bf2f0eafb3e8f3307ae030cf8c26e72e924c0e

  • SHA256

    ee830379ce7b2d84d543adb9a63686fc2d7ec1b176750eb67c6aacc5a7459d72

  • SHA512

    c7a55996f496128ff687de88a729dc96da16990943e0d0021a6b4d8822d6c7e9fc4c72277c652725aae332255876b517a59fd451c12dbea828366c5810baa7bf

  • SSDEEP

    786432:qzO7gOOX/O7M0wPYzCY6JKRDh7E4C8xfSVvtOA4bgz65h:SigOOXG7M0jU4DhQ4UVFObbce

Malware Config

Targets

    • Target

      SOSA_CARD_GEN.exe

    • Size

      39.5MB

    • MD5

      39774c3b7261ed87aad4d8d8372a0faa

    • SHA1

      39bf2f0eafb3e8f3307ae030cf8c26e72e924c0e

    • SHA256

      ee830379ce7b2d84d543adb9a63686fc2d7ec1b176750eb67c6aacc5a7459d72

    • SHA512

      c7a55996f496128ff687de88a729dc96da16990943e0d0021a6b4d8822d6c7e9fc4c72277c652725aae332255876b517a59fd451c12dbea828366c5810baa7bf

    • SSDEEP

      786432:qzO7gOOX/O7M0wPYzCY6JKRDh7E4C8xfSVvtOA4bgz65h:SigOOXG7M0jU4DhQ4UVFObbce

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks