General

  • Target

    TURET spammer.exe

  • Size

    12.6MB

  • Sample

    250110-2k2k3atmer

  • MD5

    600c933148ba201654f6bdd332653de8

  • SHA1

    9a68cb087556c9461806492fa9478209ab16721f

  • SHA256

    7f2156374dec54c8a9f35ebb5f6ebc05b6bbac3ae4dc207f721dca2244724ab5

  • SHA512

    5625a6035adc3767459736011467a7ecd59c2b120d955a923722c7d6654d6c9fbc57c8fbaba55e06c585550b041df8aca70ab74a9ae955a898c606725c95041a

  • SSDEEP

    393216:03Wdqouwq3Obs2ClzbjdQJlSwF3MnG3xl580br2W673KH:038Luwq3ObRqzXdQn3MGxhW36

Malware Config

Targets

    • Target

      TURET spammer.exe

    • Size

      12.6MB

    • MD5

      600c933148ba201654f6bdd332653de8

    • SHA1

      9a68cb087556c9461806492fa9478209ab16721f

    • SHA256

      7f2156374dec54c8a9f35ebb5f6ebc05b6bbac3ae4dc207f721dca2244724ab5

    • SHA512

      5625a6035adc3767459736011467a7ecd59c2b120d955a923722c7d6654d6c9fbc57c8fbaba55e06c585550b041df8aca70ab74a9ae955a898c606725c95041a

    • SSDEEP

      393216:03Wdqouwq3Obs2ClzbjdQJlSwF3MnG3xl580br2W673KH:038Luwq3ObRqzXdQn3MGxhW36

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks