General

  • Target

    AudioDriver.exe

  • Size

    12.3MB

  • Sample

    240701-s7hl2axhra

  • MD5

    71232894c1efa044ca741ed326350f8a

  • SHA1

    30244ec5e944f4e2603c867087091a1743a205e6

  • SHA256

    5886a194c1b918d1d88f780cd973e66b93ddc0e906203ce814148a28affffca9

  • SHA512

    63400d2d5231c731fcee0ed16e931743c5a7831bc379018ceed941a03b8458a45fb3510bd4397094a3d0e6678131cfc24a03afe3ce5c7be13f4b7dfdc36ddb96

  • SSDEEP

    393216:QV5L1V8dvOg56L+9/pWFGRiBsnOrIWeRaDH:QLROOg56L+9/pWHGhRq

Malware Config

Targets

    • Target

      AudioDriver.exe

    • Size

      12.3MB

    • MD5

      71232894c1efa044ca741ed326350f8a

    • SHA1

      30244ec5e944f4e2603c867087091a1743a205e6

    • SHA256

      5886a194c1b918d1d88f780cd973e66b93ddc0e906203ce814148a28affffca9

    • SHA512

      63400d2d5231c731fcee0ed16e931743c5a7831bc379018ceed941a03b8458a45fb3510bd4397094a3d0e6678131cfc24a03afe3ce5c7be13f4b7dfdc36ddb96

    • SSDEEP

      393216:QV5L1V8dvOg56L+9/pWFGRiBsnOrIWeRaDH:QLROOg56L+9/pWHGhRq

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

Persistence

Account Manipulation

1
T1098

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Process Discovery

1
T1057

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks