General

  • Target

    SteamASF.exe

  • Size

    12.3MB

  • Sample

    240701-ke9aaavejk

  • MD5

    aba8c750be03dbfb6e6e70d138799cb1

  • SHA1

    287faafd0867ba0700bb2e98066a9f4d3fd28b84

  • SHA256

    8755f68eccf19add73afec66f09c565778738f79b161feb588ec5d203a7ee0e5

  • SHA512

    2aa53bf730b7bb7f331bda9b8095f16403bf6cb93915562e2a8872ccdab5bd3597e89d23997f9504edaa7c2cc6102649390241d1b343158b85469bcf63be57dc

  • SSDEEP

    393216:4zulpV5L1V8dvOg56L+9/pWFGRiBsnOrIWeRaDH:4alpLROOg56L+9/pWHGhRq

Malware Config

Targets

    • Target

      SteamASF.exe

    • Size

      12.3MB

    • MD5

      aba8c750be03dbfb6e6e70d138799cb1

    • SHA1

      287faafd0867ba0700bb2e98066a9f4d3fd28b84

    • SHA256

      8755f68eccf19add73afec66f09c565778738f79b161feb588ec5d203a7ee0e5

    • SHA512

      2aa53bf730b7bb7f331bda9b8095f16403bf6cb93915562e2a8872ccdab5bd3597e89d23997f9504edaa7c2cc6102649390241d1b343158b85469bcf63be57dc

    • SSDEEP

      393216:4zulpV5L1V8dvOg56L+9/pWFGRiBsnOrIWeRaDH:4alpLROOg56L+9/pWHGhRq

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Account Manipulation

1
T1098

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Process Discovery

1
T1057

System Information Discovery

2
T1082

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks