Overview
overview
10Static
static
3Stub/StubR...RE.bat
windows7-x64
7Stub/StubR...RE.bat
windows10-2004-x64
10Stub/StubUI.exe
windows7-x64
7Stub/StubUI.exe
windows10-2004-x64
10Stub/resou...PI.dll
windows7-x64
1Stub/resou...PI.dll
windows10-2004-x64
1Stub/resou...le.dll
windows7-x64
1Stub/resou...le.dll
windows10-2004-x64
1Stub/resou...or.dll
windows7-x64
1Stub/resou...or.dll
windows10-2004-x64
1Stub/resou...xy.dll
windows7-x64
1Stub/resou...xy.dll
windows10-2004-x64
1General
-
Target
Stub.rar
-
Size
13.7MB
-
Sample
241211-exqb8s1khm
-
MD5
58ae6587fd5a3dbac3f8511197e14c0b
-
SHA1
1277909771e2cb83adcfbf64164ef90f795844bb
-
SHA256
c4846d87be3066f1a83f08952bb31443c936e1b92483e0073a86a4e1532140ed
-
SHA512
426db72277c69d9fbf0ea5ef089c2e7c72b2047590928d0a628ba2ebda22d9be968dc6a281da98866e3ffa635612893cc32e99b65d0aa2e78358ec6792b3be2b
-
SSDEEP
393216:t+r9nMSgZoe2LRswDXhINs0XZdQcF0Y09UhsnwgWMfh:t+FqyVsMXh6ZXZdQo0YoUhawgWMfh
Behavioral task
behavioral1
Sample
Stub/StubRUNSMALWARE.bat
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Stub/StubRUNSMALWARE.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Stub/StubUI.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Stub/StubUI.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Stub/resources/SpoofAPI.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Stub/resources/SpoofAPI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Stub/resources/SpoofEnable.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Stub/resources/SpoofEnable.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Stub/resources/SpoofInjector.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Stub/resources/SpoofInjector.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Stub/resources/SpoofProxy.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Stub/resources/SpoofProxy.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Stub/StubRUNSMALWARE.bat
-
Size
6KB
-
MD5
72bd8faf339e4e373f3cd3c87ab862d6
-
SHA1
bde1905839c1a752057f211fd739c39ace23a617
-
SHA256
7b7f24ca18e76f242f2e3fc32ac6d78f7bfd0ffd05c24d22a8959e0468cc3f8f
-
SHA512
ed41a0117b14cd6b29931fb265094f300810f7d5d8c13658e4673efce37cfa053a71f935012c09e4bb825929aca8eb3c6b7a3a5bc0a87b6bfea3d24d3bfab968
-
SSDEEP
192:B9rfL8398nUo9rfL8398X89rfL8398XFH9fH9e14Hh:gT
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Deletes itself
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Stub/StubUI.exe
-
Size
10.9MB
-
MD5
9b7e728587d7d0dbcf25cd48ec930c8b
-
SHA1
f13229010375df1648ac9a15b5bbd1c474b5331e
-
SHA256
0e8063bd94bbe3a80ce2259b80cf11988842aed383bfa2045efbde44df779aa4
-
SHA512
19c47f2ea1f113eff6ed9de45abc22d9b55d45948c3b68835331325a2766eca6903ace856aded93a1f5352f194f48df2d84fa458b8c81dfd886bd02938207406
-
SSDEEP
196608:RLc4kKASm9cemXyuSyTde8zveNK+wfm/pf+xfdkRixKEr2WOHWKD39eH:C4SSm/tByxjgK+9/pWFGRi0Er2W673MH
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Stub/resources/SpoofAPI.dll
-
Size
1.3MB
-
MD5
95b428a94e88b2deea40423369c14adf
-
SHA1
17dd76cc438e245cff7d192f45a0173ddd34ae1a
-
SHA256
1cf19ba31cb4d465c458d81980d4a07dd1b3597550fe9bbbf005eeccb7ad9c6e
-
SHA512
47d9ba062b326c4778f4f44e8eb5f14ccd14b6511a955b169dc49b26d1db6ab8c2924cc3057ed580b348d213801693b17ea20e927bd5d77f0ed3ab14f2aac5e5
-
SSDEEP
24576:sIsoAeOjaoNwg7Uv4yZFhimuBaMvQBvY+Kj:SoFOjaQ1owyZPimuBgYNj
Score1/10 -
-
-
Target
Stub/resources/SpoofEnable.dll
-
Size
47KB
-
MD5
85628fd8d23269cbe625dc3a9143dbac
-
SHA1
3489bca2d367dfdb7a54a45df4f0922f427e6d92
-
SHA256
474a414482c33b404b9e48ed8973c748e046010fc6ac9b2fa3df9657074b81ea
-
SHA512
fe222c620c7f2f4567fe315a8b49a1aa786daebf20e3d4677342913212cd5fa59abf86a630e55bd4bf293b9370688d0b95de1c7723728c0d83d1be4e991e30ec
-
SSDEEP
768:xSVhfEPELPgbjlsSZlU9gBAeV1PFr71ocvm5QEEc3hxQc2Ia7+dkNaVij+PvGVlB:xSVhMdnls5qBAePFr7immbXu7+dJij+Q
Score1/10 -
-
-
Target
Stub/resources/SpoofInjector.dll
-
Size
1.3MB
-
MD5
fbd32ef93d8199755b4bff8a2bd9c01b
-
SHA1
80389cacd54110f585012463851db6e9f311915e
-
SHA256
1c2f025e3cd1d9ad69823f702b52449f1eeed553911632a456a1f1089ae75206
-
SHA512
8ee4d4320ee3aef16d0418453fe194390c426e03640a3862c0ff489c01cd497dc6064bdbe90b3a9337b78c985dbeb238008a440baddc065ae3d145da2570b9e6
-
SSDEEP
24576:KIsoAeOjaoNwg7Uv4yZFhimuBaMvQBvY+K/:goFOjaQ1owyZPimuBgYN/
Score1/10 -
-
-
Target
Stub/resources/SpoofProxy.dll
-
Size
1.3MB
-
MD5
45c2f37b8f06e6fed42b69b4abba88b5
-
SHA1
0b90660601e02898066c2c490533164af8e39f46
-
SHA256
0ff2c3004e8dd82ff5f16cadc6e582a36cb290c7cf307f49c3021bde340193c6
-
SHA512
0613b6b34912b2fb123a73a8f3054e24fffe3a3538735c2326ee7b622f2374c20365b454f403a37e70592d4a33fc0782fabf70e0ee9cecd933129c59ff023278
-
SSDEEP
24576:sIsoAeOjaoNwg7Uv4yZFhimuBaMvQBvY+Kb:SoFOjaQ1owyZPimuBgYNb
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1System Information Discovery
3System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1