General
-
Target
setup (3).exe
-
Size
12.0MB
-
Sample
240812-cfzs8szflm
-
MD5
2474594d95dc14b90454aee6887e640c
-
SHA1
8e9fb42305ef1374b3e8ccc70ae4124d8518a138
-
SHA256
5991cbdd01e767ffa7bc10b873b55ebc15baa94f1756e07eddcee878f8dede86
-
SHA512
9722cf373ecda8dca33ca790455d7aab60925b22b8e4e65193e8045a70090ddc2b75e9bd9465fa2a2525272bbe5d6aa40351d7773db0f72a999f466626cdbd5f
-
SSDEEP
196608:/Vw6eCdqyU3b01Kpn3V+uq+VvpoA1HeT39IigQCeE9TFa0Z8DOjCdylVSE06Qf/v:9eC4dL01+l+uq+Vvz1+TtIiLPY9Z8D82
Behavioral task
behavioral1
Sample
setup (3).exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
setup (3).exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
setup (3).exe
-
Size
12.0MB
-
MD5
2474594d95dc14b90454aee6887e640c
-
SHA1
8e9fb42305ef1374b3e8ccc70ae4124d8518a138
-
SHA256
5991cbdd01e767ffa7bc10b873b55ebc15baa94f1756e07eddcee878f8dede86
-
SHA512
9722cf373ecda8dca33ca790455d7aab60925b22b8e4e65193e8045a70090ddc2b75e9bd9465fa2a2525272bbe5d6aa40351d7773db0f72a999f466626cdbd5f
-
SSDEEP
196608:/Vw6eCdqyU3b01Kpn3V+uq+VvpoA1HeT39IigQCeE9TFa0Z8DOjCdylVSE06Qf/v:9eC4dL01+l+uq+Vvz1+TtIiLPY9Z8D82
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-