General
-
Target
Exela.exe
-
Size
9.5MB
-
Sample
240625-k51qtstfkn
-
MD5
8c3dcac7f2c3e4a17fc059a2bf99acaa
-
SHA1
a4161b29f6e71e4b095ce8522d05bbc560d644ed
-
SHA256
fc16cf37b46a29ff6bc0c6145be8e7357a33da5ad108997c648318251c885e5d
-
SHA512
11f71b2f3524b375b376f6b2661a96be5c2c24d3b56e02c3684d1f4e5aac3ca074549a128bc9a3079d48f4c7f29f987caf8cf334d2eb83eab7ea4594260dda30
-
SSDEEP
196608:npEfRT1Xq7n0jc/bPeNrYFJMIDJ+gsAGKpRFQIIn2ygW+H92:pE5o7n0jcw8Fqy+gsiz3rn
Behavioral task
behavioral1
Sample
Exela.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Exela.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
Exela.exe
-
Size
9.5MB
-
MD5
8c3dcac7f2c3e4a17fc059a2bf99acaa
-
SHA1
a4161b29f6e71e4b095ce8522d05bbc560d644ed
-
SHA256
fc16cf37b46a29ff6bc0c6145be8e7357a33da5ad108997c648318251c885e5d
-
SHA512
11f71b2f3524b375b376f6b2661a96be5c2c24d3b56e02c3684d1f4e5aac3ca074549a128bc9a3079d48f4c7f29f987caf8cf334d2eb83eab7ea4594260dda30
-
SSDEEP
196608:npEfRT1Xq7n0jc/bPeNrYFJMIDJ+gsAGKpRFQIIn2ygW+H92:pE5o7n0jcw8Fqy+gsiz3rn
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1