General

  • Target

    ExLoader_Installer.exe

  • Size

    26.5MB

  • Sample

    250330-lah3zaxpy5

  • MD5

    dcd3344e5bdca9492706ed74cbf8b233

  • SHA1

    ed0ad8d0e65d27d34644b75fbd73b7ee8a825bc6

  • SHA256

    75243dbdd7668c07417eb463d1b4f24d8ff4781b6d5aa0522afb2509b920cf9c

  • SHA512

    9d31001b90e2610a74aa66b7d9a383094b3d904ad105b50c55be3aa46ef8be2f2a45a082e990a905b8673e4bcf320b4f078a53fe1435bd96e08df0bc9e09bca4

  • SSDEEP

    786432:+HzGgvrck3YGUanu5iNGMl6ZRFh2p8zaep7EYZJysWUt35IrLL:+TbX3YGUYuENMHFg6zPfZJysNtJI7

Malware Config

Targets

    • Target

      ExLoader_Installer.exe

    • Size

      26.5MB

    • MD5

      dcd3344e5bdca9492706ed74cbf8b233

    • SHA1

      ed0ad8d0e65d27d34644b75fbd73b7ee8a825bc6

    • SHA256

      75243dbdd7668c07417eb463d1b4f24d8ff4781b6d5aa0522afb2509b920cf9c

    • SHA512

      9d31001b90e2610a74aa66b7d9a383094b3d904ad105b50c55be3aa46ef8be2f2a45a082e990a905b8673e4bcf320b4f078a53fe1435bd96e08df0bc9e09bca4

    • SSDEEP

      786432:+HzGgvrck3YGUanu5iNGMl6ZRFh2p8zaep7EYZJysWUt35IrLL:+TbX3YGUYuENMHFg6zPfZJysNtJI7

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks