General
-
Target
3842d71609873022fdb4f18171aca6bb3871c4be570e0c02546dc3edca969838.rar
-
Size
11.4MB
-
Sample
250102-cm6kcsznfn
-
MD5
d61aa7d47dc04c8ae284b73ea1ecd725
-
SHA1
00c5f146a1b69a0d4d25413644e36a071d0cee67
-
SHA256
3842d71609873022fdb4f18171aca6bb3871c4be570e0c02546dc3edca969838
-
SHA512
e8815e22f0aa82427775e415581c6dae8333dfa766d1e90b578be56ef5b83f7e6136e0918900f3f61a6f8865680fe12d1805c472a228132df1a37c491d841f11
-
SSDEEP
196608:5Xa+DA+gFm6i9ITCPYW9Cs1tkA+qXKec9FFAuOmd7J+ClZNUdWptRVORpBy:5qBJl6Zn1tw8Kec9FFVT+CdjFoy
Behavioral task
behavioral1
Sample
fivesense.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fivesense.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
fraps.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
fraps.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
rename_me_before.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
rename_me_before.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
fivesense.txt
-
Size
673KB
-
MD5
90591254383f42c201005fea0f72a2b2
-
SHA1
bbad223efd93954685718d61818e749ad8dc9da2
-
SHA256
f6afab3cf6ced7e54aac87cc9f0c643fe541f34f17fc0cd3cd950609e9e744c5
-
SHA512
c684b71456338c87dd0a5dd47f60246fe53334a129ff8e2007575ca6a5d331699cf9ef6902ee108d4830d4d4f604c35c34390045b4c737221ca608e8c7e917eb
-
SSDEEP
12288:VoQIUdHIeunstWiZ0PAd8XWhgLKV0Pu5YDkZjLad0/eBYjS1s3W5+vkBaaU9jpca:aQIUdHMnstWiZHJuqHlTR07HJuqHlTRW
Score3/10 -
-
-
Target
fraps.dll
-
Size
628KB
-
MD5
e3211243eb53a64a1765e93e78ba939a
-
SHA1
106f44df82b49615569b0a2bd88a03b8a43c9ac9
-
SHA256
284e24f5b8b59fcba4b3eee179570ba27e5c7bc340fadefac81ad242eaba283f
-
SHA512
86ac2c1484092e3da9cf20a2e1aa1b8ae40a72ed7329fe8966dea08c51a39f75bdb3b282ca1abc4457c9b05f70f95b898aca25878ba47569b94024d2c2f9d4a4
-
SSDEEP
6144:BCxoTFnhgi6Q1QRIZCjJbBUawhkFesJ4NJ7wuRj3iuiUc+dDKRH1WJ9VvPvgvlxR:WI6wQ2AVBBSJ7wuyUcQ8HO9UjnsPvE
Score1/10 -
-
-
Target
rename_me_before.exe
-
Size
11.3MB
-
MD5
8b8040d5875e4c41ed5091f92021a16b
-
SHA1
4ebb7b91e64a7193b61a0e1405847ed13563f7d5
-
SHA256
7e7597691235f0ff8a8df29ee3e54ea7a69b43b4ef727adf511e7aec749dc68a
-
SHA512
4703f8ad9543f2aa47a1c964e13c7bad48a593284d53baac3581d6b584e63cad5c88afe6aca2c8f2c708369e757b2cd150b95247c01bfd8b58d6915fed524a7a
-
SSDEEP
196608:AUC1IYDEmmtSBLjv+bhqNVobZ1Uh8mAIv9P5jQ1KJEaKOlx:TC+OEZtSZL+9qzGZeII3MCCOlx
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1System Information Discovery
2System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1