General

  • Target

    Kryptonite-Bootstrapper.zip

  • Size

    10.7MB

  • Sample

    250220-whk8ea1req

  • MD5

    d0ceb1e605d1ffd84aa739c4582ddf7e

  • SHA1

    060340df48aadfa89a18ac500e200f77dd4757d8

  • SHA256

    5f035da3596281d9019ebd93d84b0dee8500f1a389a37b6c4b7915cd25c0140c

  • SHA512

    adb6a7b3f31aec442a2053b610c22db9a0faa83a0b3f2f90b7429f662a65f42356ff6a7c7e44dd5d6e5eab335263fff64e83cd91e954cf862fc5f2669af56634

  • SSDEEP

    196608:Rm5Fn6OqXPLaZ3C7YoKicHitq/OUu6jPKDdTOT3jwzsRuZMYhdLOkIiNHdZH3:Rm/ns/LaNC7dcVu6GDdazszROudLnrHP

Malware Config

Targets

    • Target

      Kryptonite-Bootstrapper/Kryptonite.exe

    • Size

      10.8MB

    • MD5

      1ef523feb99a72c512d39458ef55b6fe

    • SHA1

      8f251bf4a619ddb1e843cff7ee47c465b833b8df

    • SHA256

      4d9548e8a1ec94b709f425c2be38c77c32e977196493d1d803b1a21d4f6fc5aa

    • SHA512

      572763604a17f904f95401b6102e559a3cdeaa2bcd21745f953fdc6ca587fccc9057103984a59398172c814bdf7eba455343a20370ee229a2a0f5a6f6a410f2e

    • SSDEEP

      196608:t0bfVpqKApxyBivNm1E8giq1g9mveNo+wfm/pf+xfdkR6HAxKwCr2WOHWKD3beH:udpInii1m1Nqao+9/pWFGRZ0br2W673k

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks