General

  • Target

    skeetcracked-main.zip

  • Size

    14.0MB

  • Sample

    250131-br273ayqgq

  • MD5

    dc442717413c02fc009c9fd14622fe61

  • SHA1

    c59c2c836dc570f319e1182a23035be71ae70032

  • SHA256

    a8826a223b6c434196d7d7f47f3cac97932e170e06a5eaeaebdbf8db86988b18

  • SHA512

    c3e7e3a1c205c36aa0c2fe6819261710ffc4f51b376b5b0ee3c14839dec5c9c8605faa331a2d70f37f750bfcd1247d62b43ac5f6f401243fa2716f6e646c626c

  • SSDEEP

    393216:LdJAZBi6ku+Qrk7A57gZtNXw2XGZW86VfI:LwszOk7A57gZtNg2ORQA

Malware Config

Targets

    • Target

      gamesense/skeet.dll

    • Size

      13.2MB

    • MD5

      d564b96c6c93363d2bf9c26c17a0750f

    • SHA1

      46d334c16b1a5d44e5f0aa9441f43112512da2ec

    • SHA256

      9be2c031999fb8093ea281796ef54081b3f425fcd63ec102f13752053a50b111

    • SHA512

      e80c1a019d6e921eedd99ba340b327ead97843a0ed36ad69057bc56d3d7ef6bf3549ce84ac4c2f31a7a8db5172eaf008438bb5aa47cb60e0837f4d27a0af5e71

    • SSDEEP

      98304:a+c5Nn4FeH0GnROrT/RM45oiMYk41QUsgvWJAeDd7gjGJerIIQsY2e+w3dqip:oIgHeAinOUSJAeDx6PY2ezE

    Score
    3/10
    • Target

      gamesense/steam.exe

    • Size

      37.8MB

    • MD5

      0ff7b15175a2b679fde8330fde458ada

    • SHA1

      c02de85495e496811a4c8ecd24708088085b59ab

    • SHA256

      2dae1ef67ebfbacd8fb8191588a76c767ffe5c41aa04cfd69ef74b317a99aa66

    • SHA512

      fcf1baac1d70803af096839a20f0e27ab0e1506fdfbd12a2cb5a2cac3b32cd27273bb705f9e91327df5ff4eb512c520fa554265d1f7dab317704fbb6246dd526

    • SSDEEP

      196608:zyOSKApx3ivNm1E8giq1g9mveNo+wfm/pf+xfdkR6HAxKwCr2WOHWKD3beH:fQn3i1m1Nqao+9/pWFGRZ0br2W673KH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks