General
-
Target
Desktop.exe
-
Size
9.8MB
-
Sample
240618-w6cwyaycjl
-
MD5
44265fe120ee31b939e6d4aca9cdeb80
-
SHA1
9452e1039f82023136c12a4cf11f9dfccba389f4
-
SHA256
6f72152cb1615a64f0e8c49ba8f49dea012dbad0badd521eeda3290c6959fd84
-
SHA512
f0c90551338c821fbe9bd81f4f25325bb4c2ae29191c7df842099db53c6da9536a45d6488d369c93b52379df6b33f541709a7cf9a25a5436f5d5f5caa688103d
-
SSDEEP
196608:j3GvGDAvRL2MYieslPns0WWAujj2anjVp4T7FOpkvC8TLMSm6NOlqFBShk3iC6:8v8s5nDFjnjD27FOG6OMD6NTFoho6
Static task
static1
Behavioral task
behavioral1
Sample
Desktop.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
discordrat
-
discord_token
MTIyMDc5MzQxNDI0NTgxMDI0Ng.GEBKsM.ZC_PzVBNAJuDtGSU4g7MSk0kvLhn9vVw1QBppA
-
server_id
1236364451591229492
Targets
-
-
Target
Desktop.exe
-
Size
9.8MB
-
MD5
44265fe120ee31b939e6d4aca9cdeb80
-
SHA1
9452e1039f82023136c12a4cf11f9dfccba389f4
-
SHA256
6f72152cb1615a64f0e8c49ba8f49dea012dbad0badd521eeda3290c6959fd84
-
SHA512
f0c90551338c821fbe9bd81f4f25325bb4c2ae29191c7df842099db53c6da9536a45d6488d369c93b52379df6b33f541709a7cf9a25a5436f5d5f5caa688103d
-
SSDEEP
196608:j3GvGDAvRL2MYieslPns0WWAujj2anjVp4T7FOpkvC8TLMSm6NOlqFBShk3iC6:8v8s5nDFjnjD27FOG6OMD6NTFoho6
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1