General
-
Target
bba2d6bfae4be91d6ad87d5ab7791ec443d2b0f07515247d451341fce7eaab40
-
Size
9.3MB
-
Sample
250331-wlak3svtby
-
MD5
a8b38553a21704b9176f5b0e30176395
-
SHA1
350b4ee960048b48ce0e691a3c5183d12d931e8d
-
SHA256
bba2d6bfae4be91d6ad87d5ab7791ec443d2b0f07515247d451341fce7eaab40
-
SHA512
fb5e2c3da8fa937629bdd55e889cb6a57066cbb56c048a58d3ccbe1a09eb17d4ef6e78fb5ba9171a48668767286eb2d39803d7ad103d8f11600b7f749bdd45f7
-
SSDEEP
196608:/0Cq6VRQBBfqF15gbOgsF4GoKZk/G6QwxJJvfv0X5BM/O2Ie+EegtG8:TVoxQ5gbOl4GoKZ1RYJJvj/L+EegtV
Behavioral task
behavioral1
Sample
Grabberhydra.exe
Resource
win10ltsc2021-20250314-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
20.199.83.63:8080
ceqyzqxvsux
-
delay
1
-
install
true
-
install_file
das.exe
-
install_folder
%AppData%
Targets
-
-
Target
Grabberhydra.exe
-
Size
9.4MB
-
MD5
1a0e1a239d2d4f4d9f9e2f968eed9f27
-
SHA1
6e1da96ce51570a3f158500390d1148f2cbc2f77
-
SHA256
0f3b73e169942ba5ed7d17ad2965f821b8939fe23b6422a1284982b72db2fff8
-
SHA512
7c48f6ec212b74aa5502cbc612932d56dd02ab9ecbabf9f0c090840e12180a09c31f8d46377157a23c39f568a5f52fba986b1cee0b614191b2a1cc39a11ddc77
-
SSDEEP
196608:2W2cxg3+cemXyuSyTde8BRHvUWvofhxjno/w3iFCxHQbRpXDugkn:n2N3GtByxjBRHdAxro/w3uCxHQbzu3n
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Hydra.exe
-
Size
74KB
-
MD5
78ab7dfadb3813980dc8ad8620c7d95f
-
SHA1
9e0e1fc73ec77341164b536010f0fc5a523ff668
-
SHA256
7e2bb9f90d504bb61da3b8949d6c8eb78cfd65f800e6281f61d0bf8f46e11746
-
SHA512
06d4f2a194511d50e2691c045af7bc1795ddf9d07e628495e8c21876e291dae6b16254175adfe9b679e348039241de126ad78cfeec42b171403571afb0304f1b
-
SSDEEP
1536:CUme0cxFVTuCGbPMVymD7a3ISH1b0/WNlNQrQzciLVclN:CUm3cxFVaBbPMVS7H1b0uNlqrQzBY
-
Asyncrat family
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
2System Information Discovery
4System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1