General

  • Target

    Exela.exe

  • Size

    10.9MB

  • Sample

    240802-31ksxswbrl

  • MD5

    8e58494c2a202912309668e193df5137

  • SHA1

    b7c4192752bd3ffed8e6c734547bcf72913e42eb

  • SHA256

    88e8854e22bfb9d313d8bbcd90af3288ab7de72242e88da22b02196e1a3e3b8f

  • SHA512

    95bff5b38cb753118caba6c455bc0010595994b38f862c877b452f44c943f71c37e16e5429fea00fbc525c864245a2911ed5f1729465448f89fbed4b6b18f2d7

  • SSDEEP

    196608:N+MGbhJb3tQk5tZurErvI9pWj+laeAnags22/zEHS9ZoQlLKvoBQ:XGbh7v5tZurEUWjEVkiYynrVRG

Malware Config

Targets

    • Target

      Exela.exe

    • Size

      10.9MB

    • MD5

      8e58494c2a202912309668e193df5137

    • SHA1

      b7c4192752bd3ffed8e6c734547bcf72913e42eb

    • SHA256

      88e8854e22bfb9d313d8bbcd90af3288ab7de72242e88da22b02196e1a3e3b8f

    • SHA512

      95bff5b38cb753118caba6c455bc0010595994b38f862c877b452f44c943f71c37e16e5429fea00fbc525c864245a2911ed5f1729465448f89fbed4b6b18f2d7

    • SSDEEP

      196608:N+MGbhJb3tQk5tZurErvI9pWj+laeAnags22/zEHS9ZoQlLKvoBQ:XGbh7v5tZurEUWjEVkiYynrVRG

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • Target

      Stub.pyc

    • Size

      178KB

    • MD5

      0b4619408057552e0dcee774b6cb8f65

    • SHA1

      c364b60ddf2fd33a4368fa8f32ec50e8ff27b00d

    • SHA256

      30e940d49ce4de6dac8c07b3c7a7253c6a3b41f7fdb7b177f5da6a00fca4b31a

    • SHA512

      8772bbcf320e03e7f7157af4168d95c15ee0b719e4819307bc98b6cec7ca2c4ce624a400bf4f050bd64629ef5f821ee1437cc447b08aae9a6d739f817f0baec2

    • SSDEEP

      3072:hPGcc+7r5FEj5S1njCuGTvO0K2ehnxVZ7uuG6ZX/jaVyNq8aZ9/eM6JxB3wluH+b:hPGa79eArZ2eRHjaVRpeDNl+b

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks