General
-
Target
Exela.exe
-
Size
9.5MB
-
Sample
240627-rfzkssxcjr
-
MD5
318dd5a711a292b6c55ab9d175a13bf7
-
SHA1
dc3e2a18d7a3026e8cbb256dcae37a56675873d8
-
SHA256
be26b6c72c4a860878a70db31e079f73dbbb2ced624269739d2c35635e9720a9
-
SHA512
5f515baf14c4bf3084179de1a6d55df30659ecc01876c114cfddae947a1f1840b2430e1d08474ee486d8c15ec9253b6613ede7a4c5b6a648615baeb68681fde7
-
SSDEEP
196608:TzPE1Xq7n0jc/bPeNrYFJMIDJ+gsAGKpRZQtTmVygWBSO:fPZ7n0jcw8Fqy+gsi6yr
Behavioral task
behavioral1
Sample
Exela.exe
Resource
win11-20240611-en
Malware Config
Targets
-
-
Target
Exela.exe
-
Size
9.5MB
-
MD5
318dd5a711a292b6c55ab9d175a13bf7
-
SHA1
dc3e2a18d7a3026e8cbb256dcae37a56675873d8
-
SHA256
be26b6c72c4a860878a70db31e079f73dbbb2ced624269739d2c35635e9720a9
-
SHA512
5f515baf14c4bf3084179de1a6d55df30659ecc01876c114cfddae947a1f1840b2430e1d08474ee486d8c15ec9253b6613ede7a4c5b6a648615baeb68681fde7
-
SSDEEP
196608:TzPE1Xq7n0jc/bPeNrYFJMIDJ+gsAGKpRZQtTmVygWBSO:fPZ7n0jcw8Fqy+gsi6yr
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1