General

  • Target

    Exela.exe

  • Size

    9.5MB

  • Sample

    240625-k51qtstfkn

  • MD5

    8c3dcac7f2c3e4a17fc059a2bf99acaa

  • SHA1

    a4161b29f6e71e4b095ce8522d05bbc560d644ed

  • SHA256

    fc16cf37b46a29ff6bc0c6145be8e7357a33da5ad108997c648318251c885e5d

  • SHA512

    11f71b2f3524b375b376f6b2661a96be5c2c24d3b56e02c3684d1f4e5aac3ca074549a128bc9a3079d48f4c7f29f987caf8cf334d2eb83eab7ea4594260dda30

  • SSDEEP

    196608:npEfRT1Xq7n0jc/bPeNrYFJMIDJ+gsAGKpRFQIIn2ygW+H92:pE5o7n0jcw8Fqy+gsiz3rn

Malware Config

Targets

    • Target

      Exela.exe

    • Size

      9.5MB

    • MD5

      8c3dcac7f2c3e4a17fc059a2bf99acaa

    • SHA1

      a4161b29f6e71e4b095ce8522d05bbc560d644ed

    • SHA256

      fc16cf37b46a29ff6bc0c6145be8e7357a33da5ad108997c648318251c885e5d

    • SHA512

      11f71b2f3524b375b376f6b2661a96be5c2c24d3b56e02c3684d1f4e5aac3ca074549a128bc9a3079d48f4c7f29f987caf8cf334d2eb83eab7ea4594260dda30

    • SSDEEP

      196608:npEfRT1Xq7n0jc/bPeNrYFJMIDJ+gsAGKpRFQIIn2ygW+H92:pE5o7n0jcw8Fqy+gsiz3rn

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks