General

  • Target

    JerryFlowShakes.exe

  • Size

    209.5MB

  • Sample

    241211-xb94maynam

  • MD5

    b1fca1043e86206d7502148810708382

  • SHA1

    b1691a14f877b2bff9f9429642c3e6d6cbe8aaa0

  • SHA256

    b92da4781834b367016dba6cf130de622a253de6f9f6b107378d049dc0aa4f57

  • SHA512

    c2a00ba307f6c9719b2a7b76d79c8519a0707a51f185b5209ce4d1e3063dd326d344454d1b6282643023dc7abcebf22ba23534019deb1cc8d730761add30250c

  • SSDEEP

    196608:EWZgJOeg/ys5cemXyuSyTde8j5RHvUWvoLC9gA3oLQbRddtxeFc:9g8eg/FbtByxjj5RHdEC9LoLQb5eC

Malware Config

Targets

    • Target

      JerryFlowShakes.exe

    • Size

      209.5MB

    • MD5

      b1fca1043e86206d7502148810708382

    • SHA1

      b1691a14f877b2bff9f9429642c3e6d6cbe8aaa0

    • SHA256

      b92da4781834b367016dba6cf130de622a253de6f9f6b107378d049dc0aa4f57

    • SHA512

      c2a00ba307f6c9719b2a7b76d79c8519a0707a51f185b5209ce4d1e3063dd326d344454d1b6282643023dc7abcebf22ba23534019deb1cc8d730761add30250c

    • SSDEEP

      196608:EWZgJOeg/ys5cemXyuSyTde8j5RHvUWvoLC9gA3oLQbRddtxeFc:9g8eg/FbtByxjj5RHdEC9LoLQb5eC

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks