General

  • Target

    Vixen Free.exe_pw_infected.zip

  • Size

    38.1MB

  • Sample

    241205-egpqrsxnht

  • MD5

    3b0ef687b5f30639d7a619463a6b2fef

  • SHA1

    6ab3eed446b7414c6386034800f338016e1fbc8e

  • SHA256

    5febfa7477ba185000d4561082a4725a82df73a206f55ed85a4683ea92037a6c

  • SHA512

    4745ef32bdd742d85bddf474fdd1a4eaff42fc50d321ab9ac0a8c39f1fb9ffaddeb4dc4cb86271edd618c7b34599f9f0c7ee082b5a70789cfdbe4fa47327717e

  • SSDEEP

    786432:+yfRbGesby+pPp+b5Va4QqHCOuZRn8h3jCI4FYbQLqZw05t8G7lAUaQ:JfNGpbyWSHnQZxqZmf4YBvpUd

Malware Config

Targets

    • Target

      0x0008000000023cf8-1005

    • Size

      38.2MB

    • MD5

      435ec84a9fa0cd8a5d979f139d529edd

    • SHA1

      2cd983ba573163cd7cf34ff7e989e4773a1f1465

    • SHA256

      6ce7962f45d3739810870c363f2bfab0e9cbfe448e5b5f1e6cfab829df610eb5

    • SHA512

      5e138c594b1ac0be97ed772a2007765f5b887a71f4d2a009d5ac37f6074e78fe92a38a1d8abad560e7abfa4b78f7352e18647ec90ca8df4c014e550c1b1fe059

    • SSDEEP

      786432:2JKd4WSi4Qxe+54PNWJPhIrTfeMkusCFAYqeNKEGIW8OujWz+bvYewlgI3X22fqa:2JKjBxbyGPhI/bs1eN33W+Ue63X2wq

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks