Resubmissions

04-02-2025 17:07

250204-vmytmavndr 10

04-02-2025 16:48

250204-vbld6avjdj 7

04-02-2025 16:11

250204-tnamratjaq 7

04-02-2025 15:47

250204-s8dpgazqgz 10

04-02-2025 15:30

250204-sxnejaznct 7

04-02-2025 15:27

250204-svs71a1rdj 7

General

  • Target

    boltchecker.exe

  • Size

    17.2MB

  • Sample

    250204-vmytmavndr

  • MD5

    e94bad7ed8b8a749fcf0a6288f819a72

  • SHA1

    a005a49208d0986fd56f050f21479256014a95ea

  • SHA256

    6627a3868c3b9b01c68297da1234e6d9c52dadd756b5c20dd6b965fdf337c16c

  • SHA512

    5ff430a4096afb0b7f511b6ab7818bdeaaad2ec2afd8f4f6739d0552dcc7c83de8a508c617130176f9624599d6ab83a4f29d0a73deac181e5db04afa155d943b

  • SSDEEP

    393216:qtGV2ZW804gPYVnNSMF1+TtIiF/ZxSFau50QDNsIJugbb1T7NUe:q08W804gPQH1QtI6YD50QiIVd7ie

Malware Config

Targets

    • Target

      boltchecker.exe

    • Size

      17.2MB

    • MD5

      e94bad7ed8b8a749fcf0a6288f819a72

    • SHA1

      a005a49208d0986fd56f050f21479256014a95ea

    • SHA256

      6627a3868c3b9b01c68297da1234e6d9c52dadd756b5c20dd6b965fdf337c16c

    • SHA512

      5ff430a4096afb0b7f511b6ab7818bdeaaad2ec2afd8f4f6739d0552dcc7c83de8a508c617130176f9624599d6ab83a4f29d0a73deac181e5db04afa155d943b

    • SSDEEP

      393216:qtGV2ZW804gPYVnNSMF1+TtIiF/ZxSFau50QDNsIJugbb1T7NUe:q08W804gPQH1QtI6YD50QiIVd7ie

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Deletes itself

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks