Resubmissions

08-12-2024 14:21

241208-rn14lawkhz 10

General

  • Target

    Galaxy-Fix.6.5.7.rar

  • Size

    20.9MB

  • Sample

    241208-rn14lawkhz

  • MD5

    7c1a2b00bd8d556198b09fc796635bd0

  • SHA1

    ca60082d568123c0e9a1af8042edf96e165eb06c

  • SHA256

    96686ab00fd704a700ce99225d40e51b21ae044f2978cc4e0873f0a856b4e3c2

  • SHA512

    758c2b60c709af32b2bbb1bd98d62619c26dcd9995e1f78c401fac525150cbe1fcb59a04384226eccccc31e50223629777a535279de1de019c61fd391286d724

  • SSDEEP

    393216:qnd6VH44nFtVx1r+zbFOlL4eWcu5Wzo4mTs4fC2QY0L+3IbR:qd6VHPnF/LqzbFOJ3jkJR0L+YbR

Malware Config

Targets

    • Target

      Galaxy-Fix.6.5.7.rar

    • Size

      20.9MB

    • MD5

      7c1a2b00bd8d556198b09fc796635bd0

    • SHA1

      ca60082d568123c0e9a1af8042edf96e165eb06c

    • SHA256

      96686ab00fd704a700ce99225d40e51b21ae044f2978cc4e0873f0a856b4e3c2

    • SHA512

      758c2b60c709af32b2bbb1bd98d62619c26dcd9995e1f78c401fac525150cbe1fcb59a04384226eccccc31e50223629777a535279de1de019c61fd391286d724

    • SSDEEP

      393216:qnd6VH44nFtVx1r+zbFOlL4eWcu5Wzo4mTs4fC2QY0L+3IbR:qd6VHPnF/LqzbFOJ3jkJR0L+YbR

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks