General

  • Target

    Kwm6rTL.exe

  • Size

    20.3MB

  • Sample

    250117-zg3b3ssrfr

  • MD5

    672ebef9758dfaa3517ab395d633ef8d

  • SHA1

    fbda3a950992b9ebe2f48801127380fd1852d939

  • SHA256

    328c651934d5096876cd362a52705f90e01bb60680029127a9debf5b3d63952f

  • SHA512

    9f423f94e3d1f1fb2b9cb19d546bcf9d3be7e844e635b5a0626db5bd6d2e1019b1a7b52a380b5e664d71661042f0f0f1a0433f9682874ea81ef5384b1f3dfc22

  • SSDEEP

    196608:NrnSdWfbaX8iiis4hTJURfdeNVYFJMIDJ+gsAGKmSE2RcQOldx1FTBygTX03nT8:RSgzaXZscJ6fG+Fqy+gsMTaTrbi

Malware Config

Targets

    • Target

      Kwm6rTL.exe

    • Size

      20.3MB

    • MD5

      672ebef9758dfaa3517ab395d633ef8d

    • SHA1

      fbda3a950992b9ebe2f48801127380fd1852d939

    • SHA256

      328c651934d5096876cd362a52705f90e01bb60680029127a9debf5b3d63952f

    • SHA512

      9f423f94e3d1f1fb2b9cb19d546bcf9d3be7e844e635b5a0626db5bd6d2e1019b1a7b52a380b5e664d71661042f0f0f1a0433f9682874ea81ef5384b1f3dfc22

    • SSDEEP

      196608:NrnSdWfbaX8iiis4hTJURfdeNVYFJMIDJ+gsAGKmSE2RcQOldx1FTBygTX03nT8:RSgzaXZscJ6fG+Fqy+gsMTaTrbi

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks