Overview
overview
10Static
static
3twstealer-main.zip
windows11-21h2-x64
1twstealer-...DME.md
windows11-21h2-x64
3twstealer-...ld.bat
windows11-21h2-x64
3twstealer-...k.json
windows11-21h2-x64
3twstealer-...me.exe
windows11-21h2-x64
10Stub.pyc
windows11-21h2-x64
3twstealer-...in.pyw
windows11-21h2-x64
3twstealer-...k.json
windows11-21h2-x64
3General
-
Target
twstealer-main.zip
-
Size
12.8MB
-
Sample
240704-sv6hbs1apd
-
MD5
41ac7f3a38f52082b8a95a927eeb39af
-
SHA1
348b3bae32b300d06fa53c4bffd43556d5998f6a
-
SHA256
e75a8a541aeb8df44cb7904829518dbc08675f9a2f58f0c5f88e130ca67b6a9e
-
SHA512
8b953613760aa44d1a0ef712117470808f39e174520579a28190ede0d34b95b37e10a12e476bef8395d7af6bb054468b9c23bf4192baa2ac86f2645d41b389df
-
SSDEEP
393216:s55+jreXFp9OHaumUZeL4AqK5HMBRBzXbmE6XTytYw6Bm:m5kqzOHaumyeL4D80aEoytYPm
Behavioral task
behavioral1
Sample
twstealer-main.zip
Resource
win11-20240611-en
Behavioral task
behavioral2
Sample
twstealer-main/README.md
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
twstealer-main/build.bat
Resource
win11-20240508-en
Behavioral task
behavioral4
Sample
twstealer-main/lib/webhook.json
Resource
win11-20240611-en
Behavioral task
behavioral5
Sample
twstealer-main/lib/yourself/runme.exe
Resource
win11-20240508-en
Behavioral task
behavioral6
Sample
Stub.pyc
Resource
win11-20240611-en
Behavioral task
behavioral7
Sample
twstealer-main/main.pyw
Resource
win11-20240508-en
Behavioral task
behavioral8
Sample
twstealer-main/webhook.json
Resource
win11-20240508-en
Malware Config
Targets
-
-
Target
twstealer-main.zip
-
Size
12.8MB
-
MD5
41ac7f3a38f52082b8a95a927eeb39af
-
SHA1
348b3bae32b300d06fa53c4bffd43556d5998f6a
-
SHA256
e75a8a541aeb8df44cb7904829518dbc08675f9a2f58f0c5f88e130ca67b6a9e
-
SHA512
8b953613760aa44d1a0ef712117470808f39e174520579a28190ede0d34b95b37e10a12e476bef8395d7af6bb054468b9c23bf4192baa2ac86f2645d41b389df
-
SSDEEP
393216:s55+jreXFp9OHaumUZeL4AqK5HMBRBzXbmE6XTytYw6Bm:m5kqzOHaumyeL4D80aEoytYPm
Score1/10 -
-
-
Target
twstealer-main/README.md
-
Size
213B
-
MD5
ca590ff76610b5ecf5b5a90358a2f2b5
-
SHA1
e7419522512ef6b03ada80bc30c1523a6fe96cd1
-
SHA256
6b2fd37596c512ecf23863f3fe2ff672ce45401c341a55789907c43c5abe7a73
-
SHA512
b40875f4eb18ab8acc533eb57beaaaf670a7fb0d47c2bbe35f0587e2ae5b6b956ba35447670a00a7ab2b0b40d72990807090f5972651b9c8d18b2088b5e174e7
Score3/10 -
-
-
Target
twstealer-main/build.bat
-
Size
751B
-
MD5
387c2b3b6dcebabab504f79efdfb4ad4
-
SHA1
069c2b1cd7300ff20fc9122cecd87b5a0c14b7e6
-
SHA256
6490a8b68e886e637b82bf754184ad3e95e3e0b615564917763e235423af4fb3
-
SHA512
26b0dc2b5c49800ea13d397d4a5cda3923f5de4cfb34efa3bd3881fc2f1873f21ee49da88b5a85b9e0b4000b27ff494ce838e0bbccb9eba4a1df0a6b35448e7b
Score3/10 -
-
-
Target
twstealer-main/lib/webhook.json
-
Size
150B
-
MD5
31ed9f3bf35897af094ff7d901625f9d
-
SHA1
232c40e60c83af29c31ecd0b8dc83d29c5b965c3
-
SHA256
aa63b25fa953477a708d645595f5c63821bb28c35a1f7e755082193dab998559
-
SHA512
efb698a60e488066172fc21b59e7fe76044a766aec5329af683374282dc2447fd15eb250589367c9a75f6bade3aa67bf0fbf971eaeb624e12fef916f820574b2
Score3/10 -
-
-
Target
twstealer-main/lib/yourself/runme.exe
-
Size
13.0MB
-
MD5
d89113ebc5b873e79d643a542db44f07
-
SHA1
cecb2c37a4eab3507548716dc80ba22b9e961efa
-
SHA256
c08f0db9b95cb5772d950e450adf75ac15aeda301496e8cf1184edb30b347f84
-
SHA512
92eebc88fb990a249d5a89d70e07cca205d05779b53a20aae780892a27d2945be5bdb00c67faec72564c6e5592db77e9e481c6b995810081f985c6864168ff47
-
SSDEEP
393216:MAct+L01+l+uq+Vvj1+TtIiF90VQxPC7P6gK:MQ01+l+uqgvj1QtINiC7Pa
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Stub.pyc
-
Size
178KB
-
MD5
bd3382d5abc08aaa575a290a7ddf89b5
-
SHA1
76d3c514e0299543c8796c5042f8300c48ea75d0
-
SHA256
5d3a5ebc72f94585ba39b92cd22481fd0d89d751d58aeb9222f31f6cfedb49ca
-
SHA512
7d0d62faf1b625180032cd20f37b196e61539c507c0458f7fa0b14cc39ac45b00db667ff3affa10d9f132cb4babb89304b3ad16174ca1c16a9e589e03f5fae5d
-
SSDEEP
3072:IPGcc87YoHEj0S6njCuGivA0P2RvnxVZ7uuG6ZXG+7VyN4SWO/eM7f2tha01+r:IPGQ7jcvtY2Rvu+7VdQeC4d+r
Score3/10 -
-
-
Target
twstealer-main/main.pyw
-
Size
20KB
-
MD5
4d47365a916e7f6b61f38fc79d707272
-
SHA1
fc6ff201b90e5b0c133536d9984cc294a607ece2
-
SHA256
e1b5454597224cca1c48cf91a2031afc87078399453dfee75964250c6149239d
-
SHA512
5fea27276b98a4325b8e6b5c6cd50cd1a62696c4849d1d7727e395760b5898dd98e2538af43c171504f7a8a0b7103f67a2202676b145757145bb0489a036b152
-
SSDEEP
192:X09Vpo21VorIJXKSpbF2ZbVbybvzgZILZH//uzEslBbjjZ+A+a/vaMX8BC1fSGDh:E9rrISuEslBAahAq1
Score3/10 -
-
-
Target
twstealer-main/webhook.json
-
Size
150B
-
MD5
31ed9f3bf35897af094ff7d901625f9d
-
SHA1
232c40e60c83af29c31ecd0b8dc83d29c5b965c3
-
SHA256
aa63b25fa953477a708d645595f5c63821bb28c35a1f7e755082193dab998559
-
SHA512
efb698a60e488066172fc21b59e7fe76044a766aec5329af683374282dc2447fd15eb250589367c9a75f6bade3aa67bf0fbf971eaeb624e12fef916f820574b2
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1