Resubmissions
03-02-2025 02:50
250203-dbllgsyrer 10General
-
Target
CrosshairX.exe
-
Size
158.2MB
-
Sample
250203-dbllgsyrer
-
MD5
eae9cd4d835c01942e77aedc76f10271
-
SHA1
4a552dfc6d4a60adc3b520907a1f5e699a9cf4be
-
SHA256
bb71d7b3e81a698c483c246742a2a32248f2c7e8c8742ee1ed906569c18f69e0
-
SHA512
ce810477c0e1b8ec3072e3158f3dd992fc83595315032c46165cae6db06e5ad4ca730fc1b1362c5b51a08ebf4c2fbc079ef6c11db3f5647341d172b9b0c157f8
-
SSDEEP
3145728:/ePJJp+vgvLA8WkUYgMvCi36WGlGa3YAX9VsspSWDXDTpMfk4:/U4gx7DhazGOXDTpM8
Static task
static1
Behavioral task
behavioral1
Sample
CrosshairX.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CrosshairX.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
CrosshairX.exe
-
Size
158.2MB
-
MD5
eae9cd4d835c01942e77aedc76f10271
-
SHA1
4a552dfc6d4a60adc3b520907a1f5e699a9cf4be
-
SHA256
bb71d7b3e81a698c483c246742a2a32248f2c7e8c8742ee1ed906569c18f69e0
-
SHA512
ce810477c0e1b8ec3072e3158f3dd992fc83595315032c46165cae6db06e5ad4ca730fc1b1362c5b51a08ebf4c2fbc079ef6c11db3f5647341d172b9b0c157f8
-
SSDEEP
3145728:/ePJJp+vgvLA8WkUYgMvCi36WGlGa3YAX9VsspSWDXDTpMfk4:/U4gx7DhazGOXDTpM8
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Discovery
Network Service Discovery
1Peripheral Device Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
3System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1