General
-
Target
Random.exe
-
Size
10.8MB
-
Sample
240722-bfyeqsteme
-
MD5
6d1350a0bf5967f1ba997dedffe269c3
-
SHA1
62c6acf6290d228cdaf6831a453843d48ff48bea
-
SHA256
b081ff18e10debb0c42c059e33b04cf04d9fdfe52b48be421552b48989f28463
-
SHA512
8468c3fb5c6f807354c2ad532214deac8b446c7b362d1c4eeb97d28a02954b8c8971ed5bd3bf76e58e892c13d72faf79365a5dee6c4b3948ed387b8c1280e037
-
SSDEEP
196608:2xUHbhJb3tQk5tsurErvI9pWj+laeAnags22/VCES9ZoQlyKvo+:/Hbh7v5tsurEUWjEVkiVCDnrkR+
Behavioral task
behavioral1
Sample
Random.exe
Resource
win11-20240709-en
Malware Config
Targets
-
-
Target
Random.exe
-
Size
10.8MB
-
MD5
6d1350a0bf5967f1ba997dedffe269c3
-
SHA1
62c6acf6290d228cdaf6831a453843d48ff48bea
-
SHA256
b081ff18e10debb0c42c059e33b04cf04d9fdfe52b48be421552b48989f28463
-
SHA512
8468c3fb5c6f807354c2ad532214deac8b446c7b362d1c4eeb97d28a02954b8c8971ed5bd3bf76e58e892c13d72faf79365a5dee6c4b3948ed387b8c1280e037
-
SSDEEP
196608:2xUHbhJb3tQk5tsurErvI9pWj+laeAnags22/VCES9ZoQlyKvo+:/Hbh7v5tsurEUWjEVkiVCDnrkR+
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1