General

  • Target

    InstallerM.msi

  • Size

    11.2MB

  • Sample

    241223-p7ch8sznds

  • MD5

    6ae2e15bcb43b2fff440cd44556eedd9

  • SHA1

    c72404cdad45dc95b5df348a4c75e54158c95ac0

  • SHA256

    b83f2343f089e012b6803f754075a7ed2fcbef7c9bb5adc044dac0ff7f9a00c7

  • SHA512

    15a425f1419addada28e9876a42bfbec34327c33070a8632c0475f58cf287377ca6c677a43ef52d40c1d0ff006693a7d45c41b054d39e32fef5890ca2aa9f96d

  • SSDEEP

    196608:Svrc/XalBD4C8w0y8fBHHLgi2bQsunMSWmU5Z/b9Q/OFkRV0uuO+iL86Skch8dWl:SvrWB/PyEBH92OWmq/bu2OR5ld8ijdKr

Malware Config

Targets

    • Target

      InstallerM.msi

    • Size

      11.2MB

    • MD5

      6ae2e15bcb43b2fff440cd44556eedd9

    • SHA1

      c72404cdad45dc95b5df348a4c75e54158c95ac0

    • SHA256

      b83f2343f089e012b6803f754075a7ed2fcbef7c9bb5adc044dac0ff7f9a00c7

    • SHA512

      15a425f1419addada28e9876a42bfbec34327c33070a8632c0475f58cf287377ca6c677a43ef52d40c1d0ff006693a7d45c41b054d39e32fef5890ca2aa9f96d

    • SSDEEP

      196608:Svrc/XalBD4C8w0y8fBHHLgi2bQsunMSWmU5Z/b9Q/OFkRV0uuO+iL86Skch8dWl:SvrWB/PyEBH92OWmq/bu2OR5ld8ijdKr

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Modifies file permissions

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies Windows Firewall

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks