General

  • Target

    qim.exe

  • Size

    12.2MB

  • Sample

    250415-pv6asaxzds

  • MD5

    61ea6c1984faff2b193ed50f2d5335da

  • SHA1

    e034a1890ef5926cc567bbbffa36ed21a1b9a202

  • SHA256

    15f7c6b945305a17e0f7aa4f1bac58de37a3f93d1bda364ab81a4d15f19bac3d

  • SHA512

    009a6a7945768a073718a8c33c4e2ade4a2db7eeed559ddcfa903db4678ce1ca4c6212b906e558178ed4013462a5ef1e95c7a521732c83c84d5366c1678beb21

  • SSDEEP

    196608:ShjoxzJymqmtSzHB6yW+KrWhSELv2ejl/WT/8Qq+XZ156Qt:sjoxzJLttSzHBRYDD0uOK156Q

Malware Config

Targets

    • Target

      qim.exe

    • Size

      12.2MB

    • MD5

      61ea6c1984faff2b193ed50f2d5335da

    • SHA1

      e034a1890ef5926cc567bbbffa36ed21a1b9a202

    • SHA256

      15f7c6b945305a17e0f7aa4f1bac58de37a3f93d1bda364ab81a4d15f19bac3d

    • SHA512

      009a6a7945768a073718a8c33c4e2ade4a2db7eeed559ddcfa903db4678ce1ca4c6212b906e558178ed4013462a5ef1e95c7a521732c83c84d5366c1678beb21

    • SSDEEP

      196608:ShjoxzJymqmtSzHB6yW+KrWhSELv2ejl/WT/8Qq+XZ156Qt:sjoxzJLttSzHBRYDD0uOK156Q

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks