General
-
Target
SteamASF.exe
-
Size
12.3MB
-
Sample
240701-ke9aaavejk
-
MD5
aba8c750be03dbfb6e6e70d138799cb1
-
SHA1
287faafd0867ba0700bb2e98066a9f4d3fd28b84
-
SHA256
8755f68eccf19add73afec66f09c565778738f79b161feb588ec5d203a7ee0e5
-
SHA512
2aa53bf730b7bb7f331bda9b8095f16403bf6cb93915562e2a8872ccdab5bd3597e89d23997f9504edaa7c2cc6102649390241d1b343158b85469bcf63be57dc
-
SSDEEP
393216:4zulpV5L1V8dvOg56L+9/pWFGRiBsnOrIWeRaDH:4alpLROOg56L+9/pWHGhRq
Behavioral task
behavioral1
Sample
SteamASF.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
SteamASF.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
SteamASF.exe
-
Size
12.3MB
-
MD5
aba8c750be03dbfb6e6e70d138799cb1
-
SHA1
287faafd0867ba0700bb2e98066a9f4d3fd28b84
-
SHA256
8755f68eccf19add73afec66f09c565778738f79b161feb588ec5d203a7ee0e5
-
SHA512
2aa53bf730b7bb7f331bda9b8095f16403bf6cb93915562e2a8872ccdab5bd3597e89d23997f9504edaa7c2cc6102649390241d1b343158b85469bcf63be57dc
-
SSDEEP
393216:4zulpV5L1V8dvOg56L+9/pWFGRiBsnOrIWeRaDH:4alpLROOg56L+9/pWHGhRq
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1