General

  • Target

    ExitLagCrack.exe

  • Size

    38.7MB

  • Sample

    250415-y5sxwawxg1

  • MD5

    3b0d3b89b62a5ac9bd5f258291259f66

  • SHA1

    e554fd5f441787f64ed556109383e4a44601a7eb

  • SHA256

    f2ed3c525a58e733b7bfafaa13b075185855d259edc26581a6e1d85d6bc76bfc

  • SHA512

    6a005d24315d013d9c2f8da0c95746e9718d5299c51ef0fd76d3a03a6da4244ef8d9e81c5418268eb8a7c8cf3162aefad64c48247579033cd24905a81f0ba1d4

  • SSDEEP

    786432:Dq6igE7os4xC3i9Zu1VpRmUQ/lZ8GzNERfPBjaA6LAtGSPdp+:DPdE7i4i4pRq/lJOfPZxRgud

Malware Config

Targets

    • Target

      ExitLagCrack.exe

    • Size

      38.7MB

    • MD5

      3b0d3b89b62a5ac9bd5f258291259f66

    • SHA1

      e554fd5f441787f64ed556109383e4a44601a7eb

    • SHA256

      f2ed3c525a58e733b7bfafaa13b075185855d259edc26581a6e1d85d6bc76bfc

    • SHA512

      6a005d24315d013d9c2f8da0c95746e9718d5299c51ef0fd76d3a03a6da4244ef8d9e81c5418268eb8a7c8cf3162aefad64c48247579033cd24905a81f0ba1d4

    • SSDEEP

      786432:Dq6igE7os4xC3i9Zu1VpRmUQ/lZ8GzNERfPBjaA6LAtGSPdp+:DPdE7i4i4pRq/lJOfPZxRgud

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v16

Tasks