General

  • Target

    ExodusSetup.exe

  • Size

    23.8MB

  • Sample

    240625-1vy29awbrb

  • MD5

    6dacc9b07055417089681ba40abcab9b

  • SHA1

    2ee0959f93293180e4fc8dec4385cf0dbaa7a1f8

  • SHA256

    a0d6dd9c363ffaa6809ef24494f8bff5550f44fd0eb95c62f4437677014cf939

  • SHA512

    766d2e431ff354cf12f76c447a22bd0f205e0337f9e1f32132709232bbed13ebd9bd05ef7b13b3b7b2cf13dad59181c61734f704826ec63a25276952f64fd962

  • SSDEEP

    196608:kS200PA4mtSHeNvX+wfm/pf+xfdkR0ZWKsnarIWOzW0DaqkH:ImvtSUvX+9/pWFGRiBsnarIWeRaDH

Malware Config

Targets

    • Target

      ExodusSetup.exe

    • Size

      23.8MB

    • MD5

      6dacc9b07055417089681ba40abcab9b

    • SHA1

      2ee0959f93293180e4fc8dec4385cf0dbaa7a1f8

    • SHA256

      a0d6dd9c363ffaa6809ef24494f8bff5550f44fd0eb95c62f4437677014cf939

    • SHA512

      766d2e431ff354cf12f76c447a22bd0f205e0337f9e1f32132709232bbed13ebd9bd05ef7b13b3b7b2cf13dad59181c61734f704826ec63a25276952f64fd962

    • SSDEEP

      196608:kS200PA4mtSHeNvX+wfm/pf+xfdkR0ZWKsnarIWOzW0DaqkH:ImvtSUvX+9/pWFGRiBsnarIWeRaDH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

Persistence

Account Manipulation

1
T1098

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

3
T1082

Process Discovery

1
T1057

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks