General

  • Target

    JerryFlow.exe

  • Size

    9.5MB

  • Sample

    241211-wzag8stmbs

  • MD5

    56abdfda781413df79136f80613fb255

  • SHA1

    63bceb77cc9b2a0a44c48d67dc30cbada8459a75

  • SHA256

    3c7bf5cbfed275ff139b41fbbf5d0f7880f7732c56c87550075e53d6a37053e9

  • SHA512

    e8dc09f009ac5025ec208362dbf32b9710651eb85297badf569cb4f14704fe6823b2b74ba448a58c5bb81339c2677b55079d49b770e945f80745396d8cf0cba1

  • SSDEEP

    196608:n7PeyDFg/yV0cemXyuSyTde8j5RHvUWvoLC9gA3oLQbRdGtoLFG:7PhDFg/Y8tByxjj5RHdEC9LoLQbTLE

Malware Config

Targets

    • Target

      JerryFlow.exe

    • Size

      9.5MB

    • MD5

      56abdfda781413df79136f80613fb255

    • SHA1

      63bceb77cc9b2a0a44c48d67dc30cbada8459a75

    • SHA256

      3c7bf5cbfed275ff139b41fbbf5d0f7880f7732c56c87550075e53d6a37053e9

    • SHA512

      e8dc09f009ac5025ec208362dbf32b9710651eb85297badf569cb4f14704fe6823b2b74ba448a58c5bb81339c2677b55079d49b770e945f80745396d8cf0cba1

    • SSDEEP

      196608:n7PeyDFg/yV0cemXyuSyTde8j5RHvUWvoLC9gA3oLQbRdGtoLFG:7PhDFg/Y8tByxjj5RHdEC9LoLQbTLE

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      Stub.pyc

    • Size

      799KB

    • MD5

      ad6388afe3cd39d7f3c64f457b8f911d

    • SHA1

      0b0b5ae48a64087f7ec5cca39a3431f4cc8d1da8

    • SHA256

      abceba3c956dc058cdba7927eb220d17690ea8f34fd59d47e61d2046e2657409

    • SHA512

      b31c850b4c994711d785cab270450b7771a3009ed862ce119d25210983b6e6b727565eab8eba6f5c6ac15ba5d7357af57e04b3a54ddc312c85b9a4720e8afbf1

    • SSDEEP

      12288:Jj8aMeW0rSONBqz3g/XzDL9TZTJrNm5WcgKbD7269RW0C+ALTsVpRBTwD+:JFMexNBqz3g/XzDBdLxLKbQ0vTZwD+

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks