Overview
overview
10Static
static
10Nexus Checker.zip
windows7-x64
1Nexus Checker.zip
windows10-2004-x64
1Nexus Chec...er.exe
windows7-x64
7Nexus Chec...er.exe
windows10-2004-x64
8�G6����.pyc
windows7-x64
�G6����.pyc
windows10-2004-x64
Nexus Chec...er.exe
windows7-x64
7Nexus Chec...er.exe
windows10-2004-x64
10Stub.pyc
windows7-x64
3Stub.pyc
windows10-2004-x64
3Nexus Chec...ME.txt
windows7-x64
1Nexus Chec...ME.txt
windows10-2004-x64
1Nexus Chec...g.json
windows7-x64
3Nexus Chec...g.json
windows10-2004-x64
3General
-
Target
Nexus Checker.zip
-
Size
16.3MB
-
Sample
240712-se718a1cjg
-
MD5
680b953fa6b10a8ad84c2a69e1073cca
-
SHA1
90d52625a69bc71cbea26030f26b7008694e1834
-
SHA256
2a64c064af3b4570c916c320e34f2198c82b3278aa31e8a1add59501d97baf9e
-
SHA512
48bff486d44d6620755e419b09995775353edf71347c3645da3e783acb47dff059ffeebb7d96a3004608dd68d498c15da14e6ac4fbd8ff9bca33d265ddaff6b6
-
SSDEEP
196608:TRV15IB6ylnlPzf+JiJCsmFMvcn6hVvpqnxzKH/m4SwLRXgWPmpzdhqiYB6yD+K+:YBRlnlPSa7mmvc+cnxze5L1V8d8BR5aP
Behavioral task
behavioral1
Sample
Nexus Checker.zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Nexus Checker.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Nexus Checker/Nexus Acc Verifyer.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Nexus Checker/Nexus Acc Verifyer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
�G6����.pyc
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
�G6����.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Nexus Checker/Nexus Checker.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Nexus Checker/Nexus Checker.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Stub.pyc
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Stub.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Nexus Checker/README.txt
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Nexus Checker/README.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Nexus Checker/config.json
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
Nexus Checker/config.json
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
Nexus Checker.zip
-
Size
16.3MB
-
MD5
680b953fa6b10a8ad84c2a69e1073cca
-
SHA1
90d52625a69bc71cbea26030f26b7008694e1834
-
SHA256
2a64c064af3b4570c916c320e34f2198c82b3278aa31e8a1add59501d97baf9e
-
SHA512
48bff486d44d6620755e419b09995775353edf71347c3645da3e783acb47dff059ffeebb7d96a3004608dd68d498c15da14e6ac4fbd8ff9bca33d265ddaff6b6
-
SSDEEP
196608:TRV15IB6ylnlPzf+JiJCsmFMvcn6hVvpqnxzKH/m4SwLRXgWPmpzdhqiYB6yD+K+:YBRlnlPSa7mmvc+cnxze5L1V8d8BR5aP
Score1/10 -
-
-
Target
Nexus Checker/Nexus Acc Verifyer.exe
-
Size
6.9MB
-
MD5
b67e6e2c2fb01f4d40d5812652d41ec3
-
SHA1
b562852aee42c86ce3219a953b7a5c7619698696
-
SHA256
8e518cdb6657cc1e277c9473866eda5bcaeaeab328b8bf5368ab658be32791de
-
SHA512
9a5137a84de557c6fff7ac211190ccac98a92a480f3f5ccc4c15ccc367f202fbae1c1860826d63969009b4832311c5a42fb71117ef3263bf16b8673e3bb0152f
-
SSDEEP
98304:FRkwN+MdA5wqM5AKL8MMhJMjarJaon7JPzf+JiUCS3swhzqgez7DoDZDJ1n6hBn7:FRV15IB6ylnlPzf+JiJCsmFMvcn6hVvj
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
�G6����.pyc
-
Size
1KB
-
MD5
8a021cee244a6cdc3e8bd5983c221059
-
SHA1
9526b5949c564f8f65fd374695064ea40b7369c1
-
SHA256
ee8becf36df0ab81996c8f42afe817bca9182315a42e7f46ff3f2836390e8699
-
SHA512
807afc9fbbc5cbdd808e263d153dac96d8840b379304a7b1cca46b3f53c652dadeb2d5b23f3108cf423d9ca9a4efccf8437d393e79f35673e9a7f39460267ce2
Score1/10 -
-
-
Target
Nexus Checker/Nexus Checker.exe
-
Size
9.4MB
-
MD5
01707a64b226dbfc5c31cf2424946d57
-
SHA1
e13e8ca8f4441eb8d46bdc76bfa8dc349cab35a5
-
SHA256
135cf2b8b7baf409bace9d55e5cfc71cd5973f465bd8c0a7c60e7bea640e1741
-
SHA512
1aa0d93d8e3ee17216bb464b1670681d25b91caac81d71cd78140ab81081bda7d1cd6b6780f5fc7c52ba0a84c2ce412599874b803aaa010d6f66284fb95fc945
-
SSDEEP
196608:8qnxzKH/m4SwLRXgWPmpzdhqiYB6yD+KdWryUQI1:tnxze5L1V8d8BR5a
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Stub.pyc
-
Size
803KB
-
MD5
a8a0ac4cd2313eea6dc557a218ea3a93
-
SHA1
c9c4afaf48153320001bb288d8dabc15a8456322
-
SHA256
6bb789391161f0b409a2efbbc6ebf193e449f595bb6af345abe420b9a90e3568
-
SHA512
27f25c9cb48a05457c7cdf44c68e663f607a1d8eccbd7d0d174cc39482082412e3e260c02d1a598c443b8cd38c4b0b35648de884288a19019ee79dd87cf7c7af
-
SSDEEP
24576:+rxir6YBEGdwH7Egx/jdNco5CA0JFm9okvjp:C2Y7EJa1
Score3/10 -
-
-
Target
Nexus Checker/README.txt
-
Size
949B
-
MD5
527eb47b440e622258e6f7b7a5453154
-
SHA1
ee84f80132970d9cc1498343d95d86bf6a6977bb
-
SHA256
7297f51e6a9f75254e674f3ccc4ba8dbc9d8a57c9e63fd3504430332f5a138c8
-
SHA512
10534935422ebb716c318f6039d63d6cccf7eb338ebca646202453ba3475bacef1804fb6aa98be0649513213798944e26d9a9a8c8b08fbc3bab1c26c1767b865
Score1/10 -
-
-
Target
Nexus Checker/config.json
-
Size
44B
-
MD5
1332014499b6149f2e77aaa675aa655e
-
SHA1
d5c5ff8279ead1053c49aa8b9e01c7da6c9f7d1a
-
SHA256
aa5c79f55be176639b2cf268aa24053408f9c57771f1213a0e2d2a56506aa855
-
SHA512
a5446a979851033c5e6fe17209fdfbabb2fa6bd60d9d21fb178a740d1043a5e7dc842ccd6eb0d1917382d13870172ca7098889af15b6bb7fd7f1e429744f3d1d
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1