General
-
Target
Nursultan crack (1).zip
-
Size
25.5MB
-
Sample
250108-j53dzs1qay
-
MD5
bb66510badd72805792145efdeae31e5
-
SHA1
3500558542ae07522a4f4f85b920fc4d1c59bd8e
-
SHA256
c64c499aeaeca03cf24ed573edaabb4cfb9a69545963b073e559966bca63430d
-
SHA512
92f4bbd57a8194755e22a7b5488abe1bb21ed8d2fe5ffbcf16d2ede9d221a20e0173f438b52d7f3051b716fed3c4fcaaef394f7874122f9a085b0458fd5ff084
-
SSDEEP
786432:mwtkaAgdVeyiG5yWs8i6XrZvoc8xKdCHG:mraFdsuAWf3N
Static task
static1
Behavioral task
behavioral1
Sample
Nursultan crack.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Nursultan crack.exe
-
Size
25.5MB
-
MD5
2a38a1cfd99d14237768eccaaf8b4d1d
-
SHA1
c0c1c66d72490d1d0c6a5074b91bed8206985cc4
-
SHA256
7d8303d7239270b1d3f001061933c478519f3e04f001701a24566770ae7f489a
-
SHA512
ed1d45a26908eb3362d202ce0bf5de80fe960b97f2f0c3662b27598f2cad5869b8dca517d3f65d572ba70c6c32e8937a964c3a31f1bae8a3271d98a1ad15c993
-
SSDEEP
786432:bSXOurfH6yvD2h/Zcvr2Vu6a3zy5bxxEhcMzMw5FpsD:bSXOuVscvryAyxchcm5UD
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
3Component Object Model Hijacking
1Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Network Share Discovery
1Peripheral Device Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
5System Information Discovery
8System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1