General
-
Target
ElectronV3.exe
-
Size
24.3MB
-
Sample
240709-ztgwxavhnr
-
MD5
581804ae67622d1bd0cad82e858f4d8f
-
SHA1
946a2821cfd1f378d088a67cce87dc407aca5eb6
-
SHA256
ab7a27e2d687101fbf523100304a632fe3dde3deebc6e8189d975da23c663282
-
SHA512
4b13b34cbd839135a5553f91076dcd43262a89b1255aa954cbeeed1562e284581a1d0cbe06530690d65e06a7804d99d5c695f833dc23198bdad1d85abf5c5b72
-
SSDEEP
196608:s9/cxCmDAJediqShxWTMRHvUWvo3hxjno/w3iFCxHQbRpXm5hexVPHh:VShATMRHdgxro/w3uCxHQbW54VZ
Behavioral task
behavioral1
Sample
ElectronV3.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
ElectronV3.exe
Resource
win11-20240709-en
Malware Config
Targets
-
-
Target
ElectronV3.exe
-
Size
24.3MB
-
MD5
581804ae67622d1bd0cad82e858f4d8f
-
SHA1
946a2821cfd1f378d088a67cce87dc407aca5eb6
-
SHA256
ab7a27e2d687101fbf523100304a632fe3dde3deebc6e8189d975da23c663282
-
SHA512
4b13b34cbd839135a5553f91076dcd43262a89b1255aa954cbeeed1562e284581a1d0cbe06530690d65e06a7804d99d5c695f833dc23198bdad1d85abf5c5b72
-
SSDEEP
196608:s9/cxCmDAJediqShxWTMRHvUWvo3hxjno/w3iFCxHQbRpXm5hexVPHh:VShATMRHdgxro/w3uCxHQbW54VZ
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1