General
-
Target
7094d958e40adecae2f5d2e5f2856911.bin
-
Size
14.4MB
-
Sample
240623-ct5xeazdnk
-
MD5
7094d958e40adecae2f5d2e5f2856911
-
SHA1
4621bd0dd10144126900357d6efe842cf66c8088
-
SHA256
9c76f803b0d97557c9717e89edaaf5dc0b73e39c729e163c5512951f7eed70f0
-
SHA512
9004462febdfef58b6ecfb7374382d28d73cd78421749975b6412f40f69b063ff75a613b4f8f6f5b9af9680c4a89aef1c35d5483701533889038ca50277a9d0f
-
SSDEEP
393216:NQdqCGJWQsUcR4NzBdQJlNwF3MnG3xl/N6d9EAsn/rIWeRaPMHTy:NqOYQF5dQU3MGXgrjG0R9z
Behavioral task
behavioral1
Sample
7094d958e40adecae2f5d2e5f2856911.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
7094d958e40adecae2f5d2e5f2856911.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
7094d958e40adecae2f5d2e5f2856911.bin
-
Size
14.4MB
-
MD5
7094d958e40adecae2f5d2e5f2856911
-
SHA1
4621bd0dd10144126900357d6efe842cf66c8088
-
SHA256
9c76f803b0d97557c9717e89edaaf5dc0b73e39c729e163c5512951f7eed70f0
-
SHA512
9004462febdfef58b6ecfb7374382d28d73cd78421749975b6412f40f69b063ff75a613b4f8f6f5b9af9680c4a89aef1c35d5483701533889038ca50277a9d0f
-
SSDEEP
393216:NQdqCGJWQsUcR4NzBdQJlNwF3MnG3xl/N6d9EAsn/rIWeRaPMHTy:NqOYQF5dQU3MGXgrjG0R9z
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1