General
-
Target
SolaraTSBV2.0.exe
-
Size
22.8MB
-
Sample
240719-epwjaavgkh
-
MD5
db65708af40f2682eabc532e71cdfbce
-
SHA1
935346957fcdc18d3e8ed59c3496a6c521ff3295
-
SHA256
aa262cc1ddfb11c8e14f8628fe7af6f796b8da482f67aeb3f487cfb7567111a4
-
SHA512
ed9753917d239f5f76b4d9eb6437eb51f1b69a903959956d0210f6baa3601f1f6a1fab5b071df5e01e154c064f6dd111716c9d82a8b6a0ead7f535bb488f5632
-
SSDEEP
393216:n+7h2Jp5MivX+9/pWFGR7c2BsnqrIW1RaDH:n+7hEvX+9/pWKGFeq
Behavioral task
behavioral1
Sample
SolaraTSBV2.0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SolaraTSBV2.0.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
SolaraTSBV2.0.exe
-
Size
22.8MB
-
MD5
db65708af40f2682eabc532e71cdfbce
-
SHA1
935346957fcdc18d3e8ed59c3496a6c521ff3295
-
SHA256
aa262cc1ddfb11c8e14f8628fe7af6f796b8da482f67aeb3f487cfb7567111a4
-
SHA512
ed9753917d239f5f76b4d9eb6437eb51f1b69a903959956d0210f6baa3601f1f6a1fab5b071df5e01e154c064f6dd111716c9d82a8b6a0ead7f535bb488f5632
-
SSDEEP
393216:n+7h2Jp5MivX+9/pWFGR7c2BsnqrIW1RaDH:n+7hEvX+9/pWKGFeq
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Stub.pyc
-
Size
875KB
-
MD5
aa3f78f425af3e9980c6dc1d11c8ccfb
-
SHA1
98c82b1a60bbc0b88c23e0858dc54a7448def95c
-
SHA256
c15f682d5704649934eed26c40e34e71621933a9a60ab38e500e4a1dce84c334
-
SHA512
83ceba6cae67e94d696472d8ad9e3e4cb42178cd78713af26ff4b578ab0c4033d95c0a8ffa82a8ee6d7869069d1de04ae5d47b3d203dce1a78a6b10361e25538
-
SSDEEP
12288:vOfvwDWpnW4fai+EQbMcGIi5wgCjL6ncOWgMd9XpzQ/NIOm3FbhAYfQR69vsua:W3wUnRaizcQgL9OW31XhZwT
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1