General

  • Target

    Exela.exe

  • Size

    10.3MB

  • Sample

    240816-2hptgsvdqn

  • MD5

    9fe897633cda9fb0c3eddb24afca3103

  • SHA1

    ec55252c96c0bd47b4f4453b4330656bde9420f6

  • SHA256

    0c714ba3b25c6996ef3ed02846f53e589edded56878449b051ec289c34f7c101

  • SHA512

    a7002659d631befab38029957eddf6acf2cee372601285dea47e9182db0031f3dbc8f0dbac7a2d4c5411452508126257cc39b0783a3fd29d68f5daae4aa31090

  • SSDEEP

    196608:xOrBAY3Jb3tQk5tOeNvX+wfm/pf+xfdkRfYIWKRrIWOzW0DaqkH:AOY37v5tRvX+9/pWFGRAIBRrIWeRaDH

Malware Config

Targets

    • Target

      Exela.exe

    • Size

      10.3MB

    • MD5

      9fe897633cda9fb0c3eddb24afca3103

    • SHA1

      ec55252c96c0bd47b4f4453b4330656bde9420f6

    • SHA256

      0c714ba3b25c6996ef3ed02846f53e589edded56878449b051ec289c34f7c101

    • SHA512

      a7002659d631befab38029957eddf6acf2cee372601285dea47e9182db0031f3dbc8f0dbac7a2d4c5411452508126257cc39b0783a3fd29d68f5daae4aa31090

    • SSDEEP

      196608:xOrBAY3Jb3tQk5tOeNvX+wfm/pf+xfdkRfYIWKRrIWOzW0DaqkH:AOY37v5tRvX+9/pWFGRAIBRrIWeRaDH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • Target

      Stub.pyc

    • Size

      197KB

    • MD5

      a8cbbe00b28651d0eb0f9852700fc94f

    • SHA1

      45c9fa5cd048bc1bfc973dc80931c583b7a22e1f

    • SHA256

      b2a8c95c9a67a5b6cc0a0abb62102a1c50f1e802934402d7c886c15a9e0681d5

    • SHA512

      f5fa8b82b32eb8c26063baa2337d3bbf77088d5af3c975cc277fd251a38c7c66e8813e4599cdb3bee928d9a9b64641fbcceb86b076cb35761e1b2409cbac45e4

    • SSDEEP

      6144:PeYPhfY7bj/npPLYhYYYYY9YYPzk/Yh0lVV:iL/pFk/Ys

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks