General
-
Target
Exela.exe
-
Size
21.0MB
-
Sample
240620-yqfc8svgjd
-
MD5
78352c63f0742abb60ef2c4d3d6d5056
-
SHA1
e546b7f2f3b8415af09130bb50bec5fb3d94a6fd
-
SHA256
555193b4bf22d78d744acb28089caf091ca95bdd57653dd3ac267c71708dd001
-
SHA512
e2e91829fc1ecc67d5e8512b9064a5423dc2f718db2644d2aa67c2d3a66fce22b4c6d0f6d50d4224fffc3c37761463df3779250856bffb04a32b1aa86f0a11e7
-
SSDEEP
196608:KGlZOOepe+x+aPXq7n0jc/bPeNlInY7/s/bRy8rlMxRW5ygjbM:NY+X7n0jcwlIus/b02r
Behavioral task
behavioral1
Sample
Exela.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
Stub.pyc
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
Exela.exe
-
Size
21.0MB
-
MD5
78352c63f0742abb60ef2c4d3d6d5056
-
SHA1
e546b7f2f3b8415af09130bb50bec5fb3d94a6fd
-
SHA256
555193b4bf22d78d744acb28089caf091ca95bdd57653dd3ac267c71708dd001
-
SHA512
e2e91829fc1ecc67d5e8512b9064a5423dc2f718db2644d2aa67c2d3a66fce22b4c6d0f6d50d4224fffc3c37761463df3779250856bffb04a32b1aa86f0a11e7
-
SSDEEP
196608:KGlZOOepe+x+aPXq7n0jc/bPeNlInY7/s/bRy8rlMxRW5ygjbM:NY+X7n0jcwlIus/b02r
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Stub.pyc
-
Size
799KB
-
MD5
e3c118b6e9c30608827f887dcbe3e9eb
-
SHA1
2eebc5955b3fac168a7c73d4fde1b085d1cfdeaf
-
SHA256
02922896db6f905c802c293975d81ec2c69a58f20b93fcc561716dc25c490f6a
-
SHA512
81e715617a8e11f1d816d956b9b09b35d7035494b173cde4c0c101e13394a9ed04a24b894f04fb7eaaaa19fef7bffd141d952242858c9bc40a4f97fbb534faa7
-
SSDEEP
24576:ct4C/JgJH4D1vILAEsN9PtiB2zFN8wMdVKpsg3bwxKn:POu43RtJcdVIn
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1