General

  • Target

    VoidInjector.exe

  • Size

    11.3MB

  • Sample

    241211-zz4mvsylfz

  • MD5

    5a5746f0df5d205e231c3a3f9142d31b

  • SHA1

    7fe79128f793b3ccb3e819a12c9a35d6f5b08703

  • SHA256

    5a5eb7d2ab21ed3b43c03d4674bc9fdeb1494113db5f18c8a31ee2b99b87205c

  • SHA512

    0d3671f4b29e6b4265dc4b918365f45daf30deb1af3f011682695309217d747dff7a12344343cf8956e2ed2a0bed3d3d09986ea8ba6024050a2957c119f2e5a3

  • SSDEEP

    196608:+4ICIYD2gLivNm1E8giq1g9mJLjv+bhqNVob0Uh8mAIv9PbjjgKT1MJocOrl:tIDOZi1m1NqvL+9qzGxIIlDTkMrl

Malware Config

Targets

    • Target

      VoidInjector.exe

    • Size

      11.3MB

    • MD5

      5a5746f0df5d205e231c3a3f9142d31b

    • SHA1

      7fe79128f793b3ccb3e819a12c9a35d6f5b08703

    • SHA256

      5a5eb7d2ab21ed3b43c03d4674bc9fdeb1494113db5f18c8a31ee2b99b87205c

    • SHA512

      0d3671f4b29e6b4265dc4b918365f45daf30deb1af3f011682695309217d747dff7a12344343cf8956e2ed2a0bed3d3d09986ea8ba6024050a2957c119f2e5a3

    • SSDEEP

      196608:+4ICIYD2gLivNm1E8giq1g9mJLjv+bhqNVob0Uh8mAIv9PbjjgKT1MJocOrl:tIDOZi1m1NqvL+9qzGxIIlDTkMrl

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks