General

  • Target

    Update.exe

  • Size

    11.1MB

  • Sample

    250204-p6546aykbk

  • MD5

    d72cd1868511282ef24860b46d57bce1

  • SHA1

    af020a89fc1a5ea5fb66c38a44758fae2abd5e5a

  • SHA256

    7d61dc365211ac8a724d2975eeee89770401da2b400fd55f85051b1015d21c7c

  • SHA512

    bfac808bd9d3e85d0eb971b5a321a65b93e7557f85ef9bda65a158aa9fe13f8a5c06b5ca98e95c6dfd64aa285dce03b54cfb4f47657367d660b3f586bbc86c0f

  • SSDEEP

    196608:IQ4/FFC/KApxwivNm1E8giq1g9mveNR+wfm/pf+xfdkRGItKwrrFOPsD3k+H:57lnwi1m1NqaR+9/pWFGR28rFB3RH

Malware Config

Targets

    • Target

      Update.exe

    • Size

      11.1MB

    • MD5

      d72cd1868511282ef24860b46d57bce1

    • SHA1

      af020a89fc1a5ea5fb66c38a44758fae2abd5e5a

    • SHA256

      7d61dc365211ac8a724d2975eeee89770401da2b400fd55f85051b1015d21c7c

    • SHA512

      bfac808bd9d3e85d0eb971b5a321a65b93e7557f85ef9bda65a158aa9fe13f8a5c06b5ca98e95c6dfd64aa285dce03b54cfb4f47657367d660b3f586bbc86c0f

    • SSDEEP

      196608:IQ4/FFC/KApxwivNm1E8giq1g9mveNR+wfm/pf+xfdkRGItKwrrFOPsD3k+H:57lnwi1m1NqaR+9/pWFGR28rFB3RH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks