General
-
Target
GC-Cracked.exe
-
Size
38.7MB
-
Sample
240722-bdjtkatdlh
-
MD5
1dfb83bd1064ce3ea06668d695502adf
-
SHA1
909d179c2da984fd233ef1c80db3c8274b52e02b
-
SHA256
d612dca4a8fdbb3f559bec6e238183b4def59d16c9e6daa6bcd7ebc681788d78
-
SHA512
87af398a38226c30bde7ddf56196ad7075c271b70610f05858bc5e3c9e799d9185aef31dc331dec1b69248bf165fc098c1fe6cbf868c73d4173b34d333823632
-
SSDEEP
786432:KGzxfrl5B5Hxc5RVqe+K+jrqrWBA1y3z+pOMoDoBXuO0WCN/:KmNzbHIUKNrO0BXuB
Static task
static1
Behavioral task
behavioral1
Sample
GC-Cracked.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
GC-Cracked.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
GC-Cracked.exe
-
Size
38.7MB
-
MD5
1dfb83bd1064ce3ea06668d695502adf
-
SHA1
909d179c2da984fd233ef1c80db3c8274b52e02b
-
SHA256
d612dca4a8fdbb3f559bec6e238183b4def59d16c9e6daa6bcd7ebc681788d78
-
SHA512
87af398a38226c30bde7ddf56196ad7075c271b70610f05858bc5e3c9e799d9185aef31dc331dec1b69248bf165fc098c1fe6cbf868c73d4173b34d333823632
-
SSDEEP
786432:KGzxfrl5B5Hxc5RVqe+K+jrqrWBA1y3z+pOMoDoBXuO0WCN/:KmNzbHIUKNrO0BXuB
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Hide Artifacts: Hidden Files and Directories
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1