General
-
Target
blessed_beta.exe
-
Size
11.2MB
-
Sample
240705-z8fmdsydlc
-
MD5
cf820817ac61842aa0429fc4b8977ef8
-
SHA1
8783d4d2f3d1daee97cab7a3e4ea681698732064
-
SHA256
bc453d4ef66b8f580897308af2cccbebeb2423c008a2b7bcea0483bd021714ec
-
SHA512
470c23c6d8ff537e524191ac7b0ceffca959162a73e810d45aa06ad0dc6c6b52ed887c270f0cc7f15f0b4251625ff70205dcdd99785914264f775ccaca4e317e
-
SSDEEP
196608:wXcisRkFC/PAgtSwLRXgWPmpzdhqiUeNvX+wfm/pf+xfdkRpjHKsnzruOZW0D+qI:risHAgt5L1V8dvvX+9/pWFGRBqsnzrul
Behavioral task
behavioral1
Sample
blessed_beta.exe
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
blessed_beta.exe
Resource
win11-20240704-en
Malware Config
Targets
-
-
Target
blessed_beta.exe
-
Size
11.2MB
-
MD5
cf820817ac61842aa0429fc4b8977ef8
-
SHA1
8783d4d2f3d1daee97cab7a3e4ea681698732064
-
SHA256
bc453d4ef66b8f580897308af2cccbebeb2423c008a2b7bcea0483bd021714ec
-
SHA512
470c23c6d8ff537e524191ac7b0ceffca959162a73e810d45aa06ad0dc6c6b52ed887c270f0cc7f15f0b4251625ff70205dcdd99785914264f775ccaca4e317e
-
SSDEEP
196608:wXcisRkFC/PAgtSwLRXgWPmpzdhqiUeNvX+wfm/pf+xfdkRpjHKsnzruOZW0D+qI:risHAgt5L1V8dvvX+9/pWFGRBqsnzrul
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1