General

  • Target

    fixsolve.rar

  • Size

    17.9MB

  • Sample

    250219-p5ynpasp19

  • MD5

    e7200a9d41ccbc6117adc585d80a339b

  • SHA1

    1a81172d0cbb33f3c304f4282a92e4bfe6e9329f

  • SHA256

    02885f0df1df616298a4768a79af718894f63b0fa953f682eea823999ab2cc8d

  • SHA512

    65a65550ad2711ed0d36f9c375aefe544ddba9c74a08439af1952a07ee02e34b98bccd10ab3c1c153d57baf3e88e499a3468ab8101dd71ae25b7af2eaaf02c22

  • SSDEEP

    393216:NzRxZS3atZgob/Fx1Yt4fCia/LTM968jbhc4iQkLZ3+mUedksWtOlXCKaH1a/0:1R4uZdYaq//cEik7UKWydaH100

Malware Config

Targets

    • Target

      MAPPING/HWID.dll

    • Size

      1.3MB

    • MD5

      6a635fa58e5455397180eda307fb64ba

    • SHA1

      0e83defcbafec8c15707e2e71947e77d960a3648

    • SHA256

      bd6843726688bd7253a42180bf95671ad5b0f9e787adb4f13250f484abd9eae4

    • SHA512

      00a318b1fdb38efef39351e291fd8db9bd096307a1b6319191cfcbef6d5b7e0486cb19968291f64d3d2fe48e062bbfdec9c2e185010848b7df87bead4eac2fbb

    • SSDEEP

      24576:8HVrqyQ8I2dBY8rekRCw7qb+sOZaDKSiEEemqzipKB:8HVrqbuYw75ZOVviE

    Score
    3/10
    • Target

      MAPPING/HWID.exe

    • Size

      10.8MB

    • MD5

      40f6b1d4460a754b7205d373508290e4

    • SHA1

      2b369c593bed26a48bdadb0e349123a97ecaefb1

    • SHA256

      2b32692adabb4a79ca82fa1cb69f31070aa50455689eb2e621f771b013b75d7e

    • SHA512

      701d257bdd16acb063a2917f04248a9924373d7b590319eda4acab21a963538845f7a8c5cb4c7343e85d12d5b9648ae75fbb6bc088ee6ff121545e047b131cd4

    • SSDEEP

      196608:Z0PZEKAU3cj5TcivNm1E8giq1g9mveNo+wfm/pf+xfdkRKOAxKwCr2WOHWKD3beH:SZy/ci1m1Nqao+9/pWFGRw0br2W673KH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      fix solve.exe

    • Size

      6.9MB

    • MD5

      64a99fc7ace0438546ef69c84d4b7e7a

    • SHA1

      690bf1ba7abb0224f5c75faea9f08b014dd8150c

    • SHA256

      fd6553bf4a56736ed59a43b0d2b1ec092ea9eaa9316facecb4203d55a50c99f9

    • SHA512

      ab9c8dbe10f0c93b1dba5a7b0ec2d654b1ec712c9ff42b89ff7ca1221bada30129689777970f144f1a791e74f4e3c7708881af25bb4bd93ff377a82098394a1c

    • SSDEEP

      196608:MWj0MMd5eNTfm/pf+xk4dWRimrbW3jmy+:w4y/pWu4kRimrbmyR

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks