General
-
Target
ELETRON.CRACKED.exe
-
Size
11.8MB
-
Sample
240721-wddyjazbmp
-
MD5
e1a7232e64b20edc812373e57c87abb4
-
SHA1
b94d4231ed94e7573861973a0899a4406e8e69d4
-
SHA256
42125fea3a55fdff20c9c2ecae70784bb9207beec55f47dd963a9c594c1ba490
-
SHA512
94fe4d9d46b029b3cfa59a4b62d5815b081a34281e8a80b1c7a4a20bd16dcc9dada85b5ecfbc539c20a8bf0456c31dc54ffa2758a36c00aecba3d70e04e89c80
-
SSDEEP
196608:hLT0PA+Jb3tQk5tOeNvX+wfm/pf+xfdkRGZWKsnwrIWOzW0DaqkH:x9+7v5tRvX+9/pWFGRsBsnwrIWeRaDH
Behavioral task
behavioral1
Sample
ELETRON.CRACKED.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ELETRON.CRACKED.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
ELETRON.CRACKED.exe
-
Size
11.8MB
-
MD5
e1a7232e64b20edc812373e57c87abb4
-
SHA1
b94d4231ed94e7573861973a0899a4406e8e69d4
-
SHA256
42125fea3a55fdff20c9c2ecae70784bb9207beec55f47dd963a9c594c1ba490
-
SHA512
94fe4d9d46b029b3cfa59a4b62d5815b081a34281e8a80b1c7a4a20bd16dcc9dada85b5ecfbc539c20a8bf0456c31dc54ffa2758a36c00aecba3d70e04e89c80
-
SSDEEP
196608:hLT0PA+Jb3tQk5tOeNvX+wfm/pf+xfdkRGZWKsnwrIWOzW0DaqkH:x9+7v5tRvX+9/pWFGRsBsnwrIWeRaDH
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Stub.pyc
-
Size
876KB
-
MD5
8d73a00dc0d7ea318824901e48f02921
-
SHA1
a83ce61825286f0908f64d9d1fab3c007edb7039
-
SHA256
874d3b1ae43cb4597adb6b4cd4b77621a840263463191e2e34342677003c69cb
-
SHA512
7823abe9bddc5a45a34b2c404dae8f9f4bf628d5a18afeea84a83b6048e935ddc595cb7b9e00fad45dc7d382f8f55c9d6b84a268a8008ee712d727340c079eed
-
SSDEEP
12288:RgWsi7/5Wlwoh852L3ctRrO++Lc7QlmKPfYcNXzz:Ii7/5Wqoh8YzX3fYct
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1