General
-
Target
blessed_beta.exe
-
Size
11.2MB
-
Sample
240705-1cgp9awekp
-
MD5
cf820817ac61842aa0429fc4b8977ef8
-
SHA1
8783d4d2f3d1daee97cab7a3e4ea681698732064
-
SHA256
bc453d4ef66b8f580897308af2cccbebeb2423c008a2b7bcea0483bd021714ec
-
SHA512
470c23c6d8ff537e524191ac7b0ceffca959162a73e810d45aa06ad0dc6c6b52ed887c270f0cc7f15f0b4251625ff70205dcdd99785914264f775ccaca4e317e
-
SSDEEP
196608:wXcisRkFC/PAgtSwLRXgWPmpzdhqiUeNvX+wfm/pf+xfdkRpjHKsnzruOZW0D+qI:risHAgt5L1V8dvvX+9/pWFGRBqsnzrul
Behavioral task
behavioral1
Sample
blessed_beta.exe
Resource
win10v2004-20240704-en
Malware Config
Targets
-
-
Target
blessed_beta.exe
-
Size
11.2MB
-
MD5
cf820817ac61842aa0429fc4b8977ef8
-
SHA1
8783d4d2f3d1daee97cab7a3e4ea681698732064
-
SHA256
bc453d4ef66b8f580897308af2cccbebeb2423c008a2b7bcea0483bd021714ec
-
SHA512
470c23c6d8ff537e524191ac7b0ceffca959162a73e810d45aa06ad0dc6c6b52ed887c270f0cc7f15f0b4251625ff70205dcdd99785914264f775ccaca4e317e
-
SSDEEP
196608:wXcisRkFC/PAgtSwLRXgWPmpzdhqiUeNvX+wfm/pf+xfdkRpjHKsnzruOZW0D+qI:risHAgt5L1V8dvvX+9/pWFGRBqsnzrul
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1