General

  • Target

    DexLogo.png

  • Size

    104KB

  • Sample

    241124-zc5lmstrbp

  • MD5

    3c996b6f3a892ca41e22b203714c21b2

  • SHA1

    45a2af707f4f93196f05a0c30db044e14b0698bb

  • SHA256

    0ac8093eb7a5cad5f85c462be90ab5c33a093490e3118f1d98846fd5bffee686

  • SHA512

    68f4162e0d9e18f39687d14babc4cb4e63b422dc8295f2a0bc37d8fc0dd3b72889b1e9fdb99a92c17714518081b7471a3371ea921bd8769a162c5ec498960798

  • SSDEEP

    1536:S9ISS5AVuCkdD3v5ytq3s7uhrQmxxZOeIBEr9UiyV:S9IltCwf5cqgO02xZwEZWV

Malware Config

Targets

    • Target

      DexLogo.png

    • Size

      104KB

    • MD5

      3c996b6f3a892ca41e22b203714c21b2

    • SHA1

      45a2af707f4f93196f05a0c30db044e14b0698bb

    • SHA256

      0ac8093eb7a5cad5f85c462be90ab5c33a093490e3118f1d98846fd5bffee686

    • SHA512

      68f4162e0d9e18f39687d14babc4cb4e63b422dc8295f2a0bc37d8fc0dd3b72889b1e9fdb99a92c17714518081b7471a3371ea921bd8769a162c5ec498960798

    • SSDEEP

      1536:S9ISS5AVuCkdD3v5ytq3s7uhrQmxxZOeIBEr9UiyV:S9IltCwf5cqgO02xZwEZWV

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • A potential corporate email address has been identified in the URL: [email protected]

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks