General

  • Target

    Multiplayer AC Fix.exe

  • Size

    38.2MB

  • Sample

    250127-e63nxs1mcs

  • MD5

    28931075656fd1b8177124b7f995cdf8

  • SHA1

    365ec5069a47acc352f55c13ca9802fd9533a088

  • SHA256

    d018916535518e87158d763f5ccbf20e2c0e3d5ea0f482469751f35f46542931

  • SHA512

    bed71d48520b5f83fabfa66873d14b24c323979bba8d7f4a9451edffff77dde43fc1194092b3bfa1fea966d2bf2e6c0f2b02eeb19a8fac422ea09718bd0f7b5d

  • SSDEEP

    786432:wKYmajPKPKN6JBCIR4qM6/mXDrVHAp4hdrn1Q2SEcz5/2p2g:wDmiPK26J1v/mDpq4/rn1hSEQW

Malware Config

Targets

    • Target

      Multiplayer AC Fix.exe

    • Size

      38.2MB

    • MD5

      28931075656fd1b8177124b7f995cdf8

    • SHA1

      365ec5069a47acc352f55c13ca9802fd9533a088

    • SHA256

      d018916535518e87158d763f5ccbf20e2c0e3d5ea0f482469751f35f46542931

    • SHA512

      bed71d48520b5f83fabfa66873d14b24c323979bba8d7f4a9451edffff77dde43fc1194092b3bfa1fea966d2bf2e6c0f2b02eeb19a8fac422ea09718bd0f7b5d

    • SSDEEP

      786432:wKYmajPKPKN6JBCIR4qM6/mXDrVHAp4hdrn1Q2SEcz5/2p2g:wDmiPK26J1v/mDpq4/rn1hSEQW

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks