General
-
Target
Nursultan Alpha.exe
-
Size
19.6MB
-
Sample
240715-yhj2fsyfjc
-
MD5
d3f611136dd32753021838c58644113a
-
SHA1
9dd7f106c0d59b6f3f299980ba9c5bddfbd56671
-
SHA256
11df8182358b1cc5162d910721247864b70d4bc44a3bfddbf3cb8a5aa801b6f0
-
SHA512
dd08b97d2c37c5c790a4bd2bca0d2fb4f91a8ca9c9c3d823778ec727df89dbba3b6c110ef5c401dc6957025a5e4857cf7e7f81f1e8cfb1929283203e8b2b056a
-
SSDEEP
196608:hjf091nWq7n0jc/bPeNrYFJMIDJ+gsAGKpRTb5y+6q88uO:KLl7n0jcw8Fqy+gsiJM
Behavioral task
behavioral1
Sample
Nursultan Alpha.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Nursultan Alpha.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
Nursultan Alpha.exe
-
Size
19.6MB
-
MD5
d3f611136dd32753021838c58644113a
-
SHA1
9dd7f106c0d59b6f3f299980ba9c5bddfbd56671
-
SHA256
11df8182358b1cc5162d910721247864b70d4bc44a3bfddbf3cb8a5aa801b6f0
-
SHA512
dd08b97d2c37c5c790a4bd2bca0d2fb4f91a8ca9c9c3d823778ec727df89dbba3b6c110ef5c401dc6957025a5e4857cf7e7f81f1e8cfb1929283203e8b2b056a
-
SSDEEP
196608:hjf091nWq7n0jc/bPeNrYFJMIDJ+gsAGKpRTb5y+6q88uO:KLl7n0jcw8Fqy+gsiJM
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1