General

  • Target

    Wave.exe

  • Size

    9.8MB

  • Sample

    250130-hgcb8a1pcy

  • MD5

    708932216a4a65b3e560893a115673f2

  • SHA1

    e9aeef34258854948f50f1c6bbd8eb69772d0e59

  • SHA256

    a3d7cd217684a58df277f072e1b7e1a4e00448f1b7530fdae13af3903d1327a5

  • SHA512

    78ce6826fa7d3d561ce69d395b62e5178ab7333a510652b614fa7864ac61bf3901a07d49b39bd43968f5f54ef6f04fd9c6aa7af7a435d05c1a3833bf61272992

  • SSDEEP

    196608:QNnP/g2ys0VxNQMiLP8qJEdHvHMeNxHFJMIDJ+gsAGKkRWyHEWzsT:/JBukqJEdPHTlFqy+gs1WYzs

Malware Config

Targets

    • Target

      Wave.exe

    • Size

      9.8MB

    • MD5

      708932216a4a65b3e560893a115673f2

    • SHA1

      e9aeef34258854948f50f1c6bbd8eb69772d0e59

    • SHA256

      a3d7cd217684a58df277f072e1b7e1a4e00448f1b7530fdae13af3903d1327a5

    • SHA512

      78ce6826fa7d3d561ce69d395b62e5178ab7333a510652b614fa7864ac61bf3901a07d49b39bd43968f5f54ef6f04fd9c6aa7af7a435d05c1a3833bf61272992

    • SSDEEP

      196608:QNnP/g2ys0VxNQMiLP8qJEdHvHMeNxHFJMIDJ+gsAGKkRWyHEWzsT:/JBukqJEdPHTlFqy+gs1WYzs

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      Stub.pyc

    • Size

      799KB

    • MD5

      986ea60d59009e4643ac95b4d50d5fb4

    • SHA1

      2936dd2ed94d101daaf12b947cada396e3b19b2c

    • SHA256

      edfec6ec07fc31c0c9c3d875e6262f362a342fdf2acfb006d46fc6a36852b05f

    • SHA512

      22ac112950353d71962737d3046db4e4ffedad7b8165efe11b1aa91c337b7dcd1a03c6bb830b9ed782a7663c4733f5c158e787d46e05e546baa38c93c56c32f1

    • SSDEEP

      24576:ChGx/p2sXyHHOHZHIMXE+Ge+vKeo0qVCB7:YU2lumVJZsCZ

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks