General

  • Target

    Exela.exe

  • Size

    10.8MB

  • Sample

    240718-zwr5nawepj

  • MD5

    1f6d7a410a0793e9800cf2f5a36e2a8c

  • SHA1

    a8d29d622582c439a39f269ed6ac729f7ca52c9c

  • SHA256

    5d1abe32bedeabeb7383ab47427a3a6c096bbe4894cd8c5a79e3af9030b58f02

  • SHA512

    4fcf13f494f4193bfd4efb2e9ddab6b6380f71b03fa762c693337cbad2002400db6cfb3d2c959d4e7ac2b77b97f79eac2c88c254d7c51dff391f1e6e0e75bdfc

  • SSDEEP

    196608:5nzaPA4mtSHeNvX+wfm/pf+xfdkR0ZWKsnarIWOzW0DaqkH:lXvtSUvX+9/pWFGRiBsnarIWeRaDH

Malware Config

Targets

    • Target

      Exela.exe

    • Size

      10.8MB

    • MD5

      1f6d7a410a0793e9800cf2f5a36e2a8c

    • SHA1

      a8d29d622582c439a39f269ed6ac729f7ca52c9c

    • SHA256

      5d1abe32bedeabeb7383ab47427a3a6c096bbe4894cd8c5a79e3af9030b58f02

    • SHA512

      4fcf13f494f4193bfd4efb2e9ddab6b6380f71b03fa762c693337cbad2002400db6cfb3d2c959d4e7ac2b77b97f79eac2c88c254d7c51dff391f1e6e0e75bdfc

    • SSDEEP

      196608:5nzaPA4mtSHeNvX+wfm/pf+xfdkR0ZWKsnarIWOzW0DaqkH:lXvtSUvX+9/pWFGRiBsnarIWeRaDH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks