General

  • Target

    Monster.exe

  • Size

    10.7MB

  • Sample

    250209-wznd4ayqav

  • MD5

    f48d8f28e2b8138e30b5031ae90f79f9

  • SHA1

    6c6e00d7a5a295f7814f082c5650070c25e868ab

  • SHA256

    c0e7d1d19d8d48d10db4458cfee55d4926e3bbe72147c8d7e6c0fbd1c33e66ec

  • SHA512

    ea066497681861fa7ce2e7234569415c2621f9a80ef3dc7c86ac8bb382f697025ec87003b28f389e164f64aaccefb950917978772cb6b5a21fd18bf766f1f6a0

  • SSDEEP

    196608:uWx18CmQ6ADFxwNpp1v7QFpsslzon4s0D7uKj00qgDyp4EA2EQ2nEEgh:uA18CmUFSNpjcesla4s0DCB7NMEE

Malware Config

Targets

    • Target

      Monster.exe

    • Size

      10.7MB

    • MD5

      f48d8f28e2b8138e30b5031ae90f79f9

    • SHA1

      6c6e00d7a5a295f7814f082c5650070c25e868ab

    • SHA256

      c0e7d1d19d8d48d10db4458cfee55d4926e3bbe72147c8d7e6c0fbd1c33e66ec

    • SHA512

      ea066497681861fa7ce2e7234569415c2621f9a80ef3dc7c86ac8bb382f697025ec87003b28f389e164f64aaccefb950917978772cb6b5a21fd18bf766f1f6a0

    • SSDEEP

      196608:uWx18CmQ6ADFxwNpp1v7QFpsslzon4s0D7uKj00qgDyp4EA2EQ2nEEgh:uA18CmUFSNpjcesla4s0DCB7NMEE

    • Detects Monster Stealer.

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Monster

      Monster is a Golang stealer that was discovered in 2024.

    • Monster family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks