General

  • Target

    Skype.exe

  • Size

    10.8MB

  • Sample

    250128-jh71yssmdl

  • MD5

    acb5ea74898e50ffca9f426d655d08fe

  • SHA1

    55fcd77da9aec4ffdb6a3d23cb443316735fa727

  • SHA256

    e44e7810115fdafc7952fa7f62c2773812d49cf9d987114046b16fdd499ac4ee

  • SHA512

    bdacdceda1bbe1ad2b668b29fb0e21ca8451cb9429ef806d6424b444c20a3ef4b7e2b97ef047c014de8955c341c1c57f4d345b4b1f1ae9ade1609ae911031fb1

  • SSDEEP

    196608:mt9vKApxPivNm1E8giq1g9mveNo+wfm/pf+xfdkR6HAxKwCr2WOHWKD3beH:wznPi1m1Nqao+9/pWFGRZ0br2W673KH

Malware Config

Targets

    • Target

      Skype.exe

    • Size

      10.8MB

    • MD5

      acb5ea74898e50ffca9f426d655d08fe

    • SHA1

      55fcd77da9aec4ffdb6a3d23cb443316735fa727

    • SHA256

      e44e7810115fdafc7952fa7f62c2773812d49cf9d987114046b16fdd499ac4ee

    • SHA512

      bdacdceda1bbe1ad2b668b29fb0e21ca8451cb9429ef806d6424b444c20a3ef4b7e2b97ef047c014de8955c341c1c57f4d345b4b1f1ae9ade1609ae911031fb1

    • SSDEEP

      196608:mt9vKApxPivNm1E8giq1g9mveNo+wfm/pf+xfdkR6HAxKwCr2WOHWKD3beH:wznPi1m1Nqao+9/pWFGRZ0br2W673KH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks