General
-
Target
Electron_V3.rar
-
Size
9.2MB
-
Sample
240611-l4vc4ashja
-
MD5
57c67a45d8337a6e28a4a76d41428137
-
SHA1
a2d30fb658e0e22db2b7589a3f57600f890d49df
-
SHA256
00a1d4c5aed5320d9d225b4f23b567dec0b6a208ae0114150f6d8209be2fd252
-
SHA512
6826c8ab3d02a30cf37270d23cf5375beed38a1a19ec8334084a5cbbac0b6c4b81cfb39a5fcb94929743784df08cce012a6000808f314694bf9ffc0d7824c42b
-
SSDEEP
196608:z3j0MFirWtc9Espk4nM4x1afRMZii+fgW7nLyhz7hn2rRyozEB6OLlkrXJc:z3rVYEspzx14Rs+fgWShXh2rkozIPLlL
Behavioral task
behavioral1
Sample
Electron_V3.rar
Resource
win11-20240426-en
Behavioral task
behavioral2
Sample
Electron V3/ElectronV3.exe
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win11-20240426-en
Behavioral task
behavioral4
Sample
Electron V3/bin/agree.txt
Resource
win11-20240508-en
Behavioral task
behavioral5
Sample
Electron V3/scripts/Inf Yield.txt
Resource
win11-20240508-en
Behavioral task
behavioral6
Sample
Electron V3/workspace/IY_FE.iy
Resource
win11-20240426-en
Malware Config
Targets
-
-
Target
Electron_V3.rar
-
Size
9.2MB
-
MD5
57c67a45d8337a6e28a4a76d41428137
-
SHA1
a2d30fb658e0e22db2b7589a3f57600f890d49df
-
SHA256
00a1d4c5aed5320d9d225b4f23b567dec0b6a208ae0114150f6d8209be2fd252
-
SHA512
6826c8ab3d02a30cf37270d23cf5375beed38a1a19ec8334084a5cbbac0b6c4b81cfb39a5fcb94929743784df08cce012a6000808f314694bf9ffc0d7824c42b
-
SSDEEP
196608:z3j0MFirWtc9Espk4nM4x1afRMZii+fgW7nLyhz7hn2rRyozEB6OLlkrXJc:z3rVYEspzx14Rs+fgWShXh2rkozIPLlL
Score3/10 -
-
-
Target
Electron V3/ElectronV3.exe
-
Size
24.3MB
-
MD5
e891973adb4e3a6edc9738b84e382be1
-
SHA1
bab0eb519e90590a96599a52d14acf9041bcad2e
-
SHA256
0e3daf09ae8042d432ce7aff2544762024590ac89bd6753f27fbf9fdce478b7f
-
SHA512
4db3ac8856479698ab9513576d008d54f111355f437299f3b7254d8e70db5228e2d9f3cd7318c578f27009493539663c56a889647bb1de9c35ebb2e7c71713f9
-
SSDEEP
196608:tO6xCmDAJediqShxWTMRHvUWvo3hxjno/w3iFCxHQbRpXpPr+5Py:cmShATMRHdgxro/w3uCxHQbZPY
Score10/10-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Stub.pyc
-
Size
799KB
-
MD5
b83723d9ba3e5e2b477debe68a742f44
-
SHA1
95ccea42491d08d975a7f93ce155bc3fd5649555
-
SHA256
60e8697cfca7d2553b72d866e7e2b606e85148b91f340545ddec23d3fbffcc24
-
SHA512
1e9c19f28b053274312354dea5feadacbfdc5ca0863f3e920939fd2bd947df5e0c5d320cfeaf4fe295334048c3f3a28607973887fef6a9ab11323d4a310209ae
-
SSDEEP
12288:fNMfhPLKX/8JW9tZzzYy7JwZEs7Fm5Fr/mWZ71sWS7rnB+xJCRjI6kkZwyyehL:68XWWjZzzBuR+F7RgWSXBAKEk6EL
Score3/10 -
-
-
Target
Electron V3/bin/agree.txt
-
Size
4B
-
MD5
b326b5062b2f0e69046810717534cb09
-
SHA1
5ffe533b830f08a0326348a9160afafc8ada44db
-
SHA256
b5bea41b6c623f7c09f1bf24dcae58ebab3c0cdd90ad966bc43a45b44867e12b
-
SHA512
9120cd5faef07a08e971ff024a3fcbea1e3a6b44142a6d82ca28c6c42e4f852595bcf53d81d776f10541045abdb7c37950629415d0dc66c8d86c64a5606d32de
Score3/10 -
-
-
Target
Electron V3/scripts/Inf Yield.txt
-
Size
98B
-
MD5
727b09f7da97df9cf7eb1bbe0eb19fed
-
SHA1
24b31b8e25757f0b3c94c143435fcbd084eb3c52
-
SHA256
eabc284aad668b0911ea92fea5b0fcd2803fbfdf651b5fa0b4cf5e0b63544a12
-
SHA512
af379acccefb60b1ca465076469c57d09f846467b94f4ae500dcaf0c69e4418d2bf5cac3af89ad3e177291ce1d63d0649f34bc5ebeec714b66d98b365901360e
Score3/10 -
-
-
Target
Electron V3/workspace/IY_FE.iy
-
Size
539B
-
MD5
291d5636a434c4f1ceb0f3f776c2a51f
-
SHA1
ae287e08f71c522a72812f0dace94b8ffb569341
-
SHA256
73bb58ba5b81960caf5a8e66675cc89b5761b77db99c6ceb9435f7211d400452
-
SHA512
7dab8034f85aef1b2b7a86cc8220ebdbb95a3f083d1565e1cff38414367aa69fc597a11aaba11dbef411e13fbfb285855d9c46ae59738f6e88c22dd55c81a743
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1