General
-
Target
Exela.exe
-
Size
12.9MB
-
Sample
240719-ye94gazfpg
-
MD5
19371f2e016a86609463eca02c003013
-
SHA1
2a7427f9813f8142cec8000dbeb4433e760d0636
-
SHA256
5bf4ef05306f70dbd00f0229589a6e2fb1dfe0d5f8a8e41f6d82288ebb42771f
-
SHA512
43fbcbd872f1d82cb929823ee173098d79c4c8456c50c4e351c1cf1aa0c9c637ae77c402bb8c2581e743f4370e5218ed118201d3f2e97978fae2283367817c81
-
SSDEEP
196608:es2Qkd49U8mtS+urErvI9pWj+sgX3ZdahF0wB1AajGlijPOk91tQOmWVxxF:TKOatS+urEUWj/gXe7b+ijPtT6OL
Behavioral task
behavioral1
Sample
Exela.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Exela.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
Exela.exe
-
Size
12.9MB
-
MD5
19371f2e016a86609463eca02c003013
-
SHA1
2a7427f9813f8142cec8000dbeb4433e760d0636
-
SHA256
5bf4ef05306f70dbd00f0229589a6e2fb1dfe0d5f8a8e41f6d82288ebb42771f
-
SHA512
43fbcbd872f1d82cb929823ee173098d79c4c8456c50c4e351c1cf1aa0c9c637ae77c402bb8c2581e743f4370e5218ed118201d3f2e97978fae2283367817c81
-
SSDEEP
196608:es2Qkd49U8mtS+urErvI9pWj+sgX3ZdahF0wB1AajGlijPOk91tQOmWVxxF:TKOatS+urEUWj/gXe7b+ijPtT6OL
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1