General

  • Target

    Matrix.exe

  • Size

    38.6MB

  • Sample

    250126-qg5yjatlbp

  • MD5

    3c6c0672bd40f280a534ef153ac3f196

  • SHA1

    e4c1f1b71d1a38ed5435f0a40cd82d5aac91ff8e

  • SHA256

    4b816114947951ce4b0939d69460197f2d8eaab99d3ec7ea82ea83bf1f4e9949

  • SHA512

    2c1f24d8bae7ec7dfbe4a9d295e32821acdf9da7506b9e770b6bf07fa77e773e0699e36112523f6ba9fc6391dae179c5e59008a5194b43de1e3d0840d431768f

  • SSDEEP

    786432:bpqU6BGvKm56URA2lJfPEKzBl6B2O72Pjg2jrXAcqosRTNVP:bpqj6UUHhv6sOaHwcEDV

Malware Config

Targets

    • Target

      Matrix.exe

    • Size

      38.6MB

    • MD5

      3c6c0672bd40f280a534ef153ac3f196

    • SHA1

      e4c1f1b71d1a38ed5435f0a40cd82d5aac91ff8e

    • SHA256

      4b816114947951ce4b0939d69460197f2d8eaab99d3ec7ea82ea83bf1f4e9949

    • SHA512

      2c1f24d8bae7ec7dfbe4a9d295e32821acdf9da7506b9e770b6bf07fa77e773e0699e36112523f6ba9fc6391dae179c5e59008a5194b43de1e3d0840d431768f

    • SSDEEP

      786432:bpqU6BGvKm56URA2lJfPEKzBl6B2O72Pjg2jrXAcqosRTNVP:bpqj6UUHhv6sOaHwcEDV

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks