General
-
Target
Updater.zip
-
Size
10.7MB
-
Sample
240710-3dbazawapq
-
MD5
26827c9792689b74098834a6d8c20aab
-
SHA1
07e2be92ae5393afcd690fb822130535a6d2c17e
-
SHA256
482c560821dff63e878f6a8adf9e900a4e3756bd392ff92d37c135bd62e47de1
-
SHA512
90941280d2260fca8fb5c16b49819dd10d1940936cc5e48bb0b4a1bb0ff692670c85905bb1dee9f44cedd6577df26fc339ce5703eab3c4a4a43c3c00e0483a30
-
SSDEEP
196608:+ELj55Zei3SoDqxe6j5Wx2XfTmXRroRyc5LmeHH7+O7US1IxwH1/:rdui3FDqNj5FXfyhkRbKeHH7+4pICHx
Behavioral task
behavioral1
Sample
updater.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
updater.exe
Resource
win11-20240709-en
Malware Config
Targets
-
-
Target
updater.exe
-
Size
21.8MB
-
MD5
a3e0a70109eb93263061814afc7020f6
-
SHA1
930163ab2c31d4fed8d6d254c434f576849032da
-
SHA256
6afef0c45f0a2c0e67740a0c3d6c46c22923ebd86efd7e8d6d0490c691abb724
-
SHA512
dae14d2178e4060f9e80ac061fa6d6ccffd812e8d72e05349e79a142f18a4b58ff356399b843692d5003b3f7d29c4ca4ccd9c7190687b877ae7e505e2449bee0
-
SSDEEP
196608:vGRltJPArmtSreNvX+wfm/pf+xfdkR0yTlKsnfrwWOtW0DaF1H:WDOqtSQvX+9/pWFGRhAsnfrwWIRajH
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1