General

  • Target

    2c69cadc462068599979909d626794da99ee4a59a7bfe958c78ef37672571b80N.exe

  • Size

    31KB

  • Sample

    241201-eh8j9s1jen

  • MD5

    fa1a6edf209d68e04556c594969c6a20

  • SHA1

    2641fd27eee73a59058ccf14fb35df2c05ae086b

  • SHA256

    2c69cadc462068599979909d626794da99ee4a59a7bfe958c78ef37672571b80

  • SHA512

    faf5e282c673b49c8a2ed6e58075902da7ffacfeac9ab0feebd2d04b4a09b17953783037c1f13c10006ffb134538a0b10cbec472c3c41e5021f91fc950c76b12

  • SSDEEP

    768:7BKhf6RsLMnI/suUC3XytKWVvyQuV+fWn0Spea30ntYcFwVc6Kj:7BEf6RsLMnI/suUC3XytKWVvyQuV+fWc

Malware Config

Targets

    • Target

      2c69cadc462068599979909d626794da99ee4a59a7bfe958c78ef37672571b80N.exe

    • Size

      31KB

    • MD5

      fa1a6edf209d68e04556c594969c6a20

    • SHA1

      2641fd27eee73a59058ccf14fb35df2c05ae086b

    • SHA256

      2c69cadc462068599979909d626794da99ee4a59a7bfe958c78ef37672571b80

    • SHA512

      faf5e282c673b49c8a2ed6e58075902da7ffacfeac9ab0feebd2d04b4a09b17953783037c1f13c10006ffb134538a0b10cbec472c3c41e5021f91fc950c76b12

    • SSDEEP

      768:7BKhf6RsLMnI/suUC3XytKWVvyQuV+fWn0Spea30ntYcFwVc6Kj:7BEf6RsLMnI/suUC3XytKWVvyQuV+fWc

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Modifies WinLogon for persistence

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Remcos family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies WinLogon

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks