General
-
Target
Updater.zip
-
Size
10.7MB
-
Sample
240703-qx27ksyhme
-
MD5
26827c9792689b74098834a6d8c20aab
-
SHA1
07e2be92ae5393afcd690fb822130535a6d2c17e
-
SHA256
482c560821dff63e878f6a8adf9e900a4e3756bd392ff92d37c135bd62e47de1
-
SHA512
90941280d2260fca8fb5c16b49819dd10d1940936cc5e48bb0b4a1bb0ff692670c85905bb1dee9f44cedd6577df26fc339ce5703eab3c4a4a43c3c00e0483a30
-
SSDEEP
196608:+ELj55Zei3SoDqxe6j5Wx2XfTmXRroRyc5LmeHH7+O7US1IxwH1/:rdui3FDqNj5FXfyhkRbKeHH7+4pICHx
Behavioral task
behavioral1
Sample
Updater.zip
Resource
win11-20240419-en
Malware Config
Targets
-
-
Target
Updater.zip
-
Size
10.7MB
-
MD5
26827c9792689b74098834a6d8c20aab
-
SHA1
07e2be92ae5393afcd690fb822130535a6d2c17e
-
SHA256
482c560821dff63e878f6a8adf9e900a4e3756bd392ff92d37c135bd62e47de1
-
SHA512
90941280d2260fca8fb5c16b49819dd10d1940936cc5e48bb0b4a1bb0ff692670c85905bb1dee9f44cedd6577df26fc339ce5703eab3c4a4a43c3c00e0483a30
-
SSDEEP
196608:+ELj55Zei3SoDqxe6j5Wx2XfTmXRroRyc5LmeHH7+O7US1IxwH1/:rdui3FDqNj5FXfyhkRbKeHH7+4pICHx
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Deletes itself
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1