General

  • Target

    Cyber Sniffer.rar

  • Size

    14.7MB

  • Sample

    250410-y59kma1px9

  • MD5

    c642890bc1a1400dcd99335e7db4f3a9

  • SHA1

    82a173373fd92b1a67c76465e71e7892092afa36

  • SHA256

    602b9427b660f5fa3835cbc9801026731a38cfc1e102b04565a793bdd012a7b2

  • SHA512

    6c8f16a314120e2b202540224b42c17d6fdd688a87ff0afb958cd3d6d2817cb0a8a084ad572a83d5d09f1355000d9cc69ea6b056c602ed408c358472fe1aacbc

  • SSDEEP

    393216:HIHBIX+GFt3KeyjGnewLb3m/FwLDdusE+lEnDi/G0kNpPoqlI:oHBIOEtojGeGTm/Fw9q+6n+mNpPoqO

Malware Config

Targets

    • Target

      Cyber Sniffer/Cyber Sniff.exe

    • Size

      12.0MB

    • MD5

      1dc24869be83a3b3d12cd948b7de76d3

    • SHA1

      14662601b31ec28afcb33818bb4b15f54bd7cc74

    • SHA256

      249b19b21cd7ad84612c645872cfd19bc8c1232209e9a6d3392933375fea3601

    • SHA512

      ecea177e342d5154ad07295eaa80d5ff5dfd51739bfe92dc81c02c6f2f8bd3378f2563da5c5eb95e1070391aa826ac266c64b07d395d0244a987e3850ab42f48

    • SSDEEP

      196608:HEJYa+R+6FKIJo3icAKIXEcSN2wCKfPUFW5rS2s+YThPB9ivaU9LvZQ0:H8Y1KWFnrM2fKfPUFerjsH9ivftBp

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      Cyber Sniffer/CyberSniff.dll

    • Size

      2.2MB

    • MD5

      6bf3a2f9268f9cd99552aecfa10a6abd

    • SHA1

      ae49c79144df631328f74d08c806a0d999756eae

    • SHA256

      e23b27f3242ac9d3a94717eb06e20acbb229b125673430a3ac3dcfb7e73bc944

    • SHA512

      b46562ac5cc657a2166dd4fb6692a14d73b7e439c829c6db7591de767fc2e9c5a95276b785032e1d0a76cd5cc1e89b902a23813cbdf649eaf27bd89bf0ae6561

    • SSDEEP

      24576:Gj+JxH3eCsapypA2p7CjapypAZreCbapypAjl7CcapypAPW17:QweCsagP7CjagUeCbagE7CcagGW

    Score
    1/10

MITRE ATT&CK Enterprise v16

Tasks