General
-
Target
Exela.exe
-
Size
17.5MB
-
Sample
240722-xagqpasbln
-
MD5
091adbcc3e35eefbb32493278a8fb7de
-
SHA1
e14f90e01c064190fe586e2a631dd343fc4c2404
-
SHA256
279a5de1d5a4bb24adf2125e76f20d87a99c90f660ea6e25672fa8b195e68592
-
SHA512
d0fab0f0a92d7c63e0dad5e63b5036bee661952362f1525ec3ac668d67c553dbb6fc589985483a9aa40982fefc2dd91a7b6ddcdd761696b9cc58334d2f7d7793
-
SSDEEP
196608:xRtF1sJdPY71DkTeNrYFJMIDJ+gsAGKmSE2R2QgmJqkygWXO:PtI3c1b8Fqy+gsMTXzr
Behavioral task
behavioral1
Sample
Exela.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Exela.exe
Resource
win11-20240709-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win11-20240709-en
Malware Config
Targets
-
-
Target
Exela.exe
-
Size
17.5MB
-
MD5
091adbcc3e35eefbb32493278a8fb7de
-
SHA1
e14f90e01c064190fe586e2a631dd343fc4c2404
-
SHA256
279a5de1d5a4bb24adf2125e76f20d87a99c90f660ea6e25672fa8b195e68592
-
SHA512
d0fab0f0a92d7c63e0dad5e63b5036bee661952362f1525ec3ac668d67c553dbb6fc589985483a9aa40982fefc2dd91a7b6ddcdd761696b9cc58334d2f7d7793
-
SSDEEP
196608:xRtF1sJdPY71DkTeNrYFJMIDJ+gsAGKmSE2R2QgmJqkygWXO:PtI3c1b8Fqy+gsMTXzr
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Stub.pyc
-
Size
799KB
-
MD5
b5538b9d40603d6816590aef2c71f30e
-
SHA1
aab1cb86da84ef886da30c976c9c56de984393b0
-
SHA256
0ed0d7ae0151bb5954e491042d8ce5730433bebe2fa9922c3157410076e499cb
-
SHA512
14d63b8cc238e87992e929336ed3ace9338bfdeb0d26504abbb752fed14e0670a8b4e5a0e178cdb63b92e8a95f12ee10b159b0bae7d51f0a1ab746acffd09d0b
-
SSDEEP
12288:d+RfL9KYKF8UN9zTMdFd1ZwcCughgkp25jSmfNznHE2T9ODgOy02KlQSnDh3L8:kzgYQjowcCuO5p+GmV7SkK2A4
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1