Overview
overview
10Static
static
3Rebel.zip
windows11-21h2-x64
1Rebel/Bin/...or.exe
windows11-21h2-x64
5Rebel/Bin/Rebel.dll
windows11-21h2-x64
1Rebel/Fast...ox.dll
windows11-21h2-x64
1Rebel/Fast...ox.xml
windows11-21h2-x64
1Rebel/ReadMe.txt
windows11-21h2-x64
3Rebel/Rebe...ed.exe
windows11-21h2-x64
10Rebel/Syst...om.dll
windows11-21h2-x64
1Rebel/Syst...om.xml
windows11-21h2-x64
1General
-
Target
Rebel.zip
-
Size
21.3MB
-
Sample
240821-ak7nja1amf
-
MD5
a9961347c2bf461935d49b18c44de4d8
-
SHA1
b0e6467d491a08800c5ba22c850150f12f9469e9
-
SHA256
7d95f2dbdfffd9227cc5832d6ee21c385a18c43b4155edc3a9fc1d988c63bf78
-
SHA512
3f1fff87139c40c36d73a84067b0b6714a2899d4d15207c9def07ddb70ae1aeb718546fc1e7092b3e709fe5cf0022be716f4bef937d89d4edab0d1f4c23bc1ea
-
SSDEEP
393216:N1gER06ohhz3+cMDTvxqIDhVYZT/cXP+Z/ZRcWOt2nZLOhpLD4PJUF8XlhlchC3c:N1Elh9Mv0ahKh0faTcOn1OhpP4RUF8Ve
Static task
static1
Behavioral task
behavioral1
Sample
Rebel.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Rebel/Bin/Injector.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Rebel/Bin/Rebel.dll
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
Rebel/FastColoredTextBox.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
Rebel/FastColoredTextBox.xml
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
Rebel/ReadMe.txt
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Rebel/RebelCracked.exe
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
Rebel/System.CodeDom.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
Rebel/System.CodeDom.xml
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
Rebel.zip
-
Size
21.3MB
-
MD5
a9961347c2bf461935d49b18c44de4d8
-
SHA1
b0e6467d491a08800c5ba22c850150f12f9469e9
-
SHA256
7d95f2dbdfffd9227cc5832d6ee21c385a18c43b4155edc3a9fc1d988c63bf78
-
SHA512
3f1fff87139c40c36d73a84067b0b6714a2899d4d15207c9def07ddb70ae1aeb718546fc1e7092b3e709fe5cf0022be716f4bef937d89d4edab0d1f4c23bc1ea
-
SSDEEP
393216:N1gER06ohhz3+cMDTvxqIDhVYZT/cXP+Z/ZRcWOt2nZLOhpLD4PJUF8XlhlchC3c:N1Elh9Mv0ahKh0faTcOn1OhpP4RUF8Ve
Score1/10 -
-
-
Target
Rebel/Bin/Injector.exe
-
Size
4.8MB
-
MD5
8da7ffaee1e5988d56e536d37a5e5d7d
-
SHA1
ed799e5ec866ec3dff0bffb306de4b1ab2ca2361
-
SHA256
7450c90fad1d9ed73652c7fee391adb41ee2c62d5d43f3bdcab945e3fdec5485
-
SHA512
34579bfbee7ec802322b12cc91276dc440d2df63d8e02b55ec303a19b4a198810a97157cf82739d0c30a509928d797142cee133aec994f0c8f5c58c5a6aebd16
-
SSDEEP
98304:2sscM3M0egRUUYdiVF0Zx5NMEuRdvwp1cpY1t83Szkkak0jIiGELfHNz:Vrf0egyUKiVF0rF+dmcQtQSzkkakuR7V
Score5/10-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Rebel/Bin/Rebel.dll
-
Size
8.6MB
-
MD5
660d2429fc5f088bd197fb0958303936
-
SHA1
4189d1ba115f9e00caceb286f22655c6988e1eb6
-
SHA256
c9b95b9204234edfab46912d21953e3a6985a6b7d50c4fd63372e3d5361c7f3d
-
SHA512
9875fff045460f77dfc21cecd1de326d67778efd12fe8f53fc09bacfec807a9309752ed4bbb23653060fbee9152dd7c9a9bfda3a0c13c0375a1db932a02a197d
-
SSDEEP
98304:kz+S5QwKbQLCsjIpdUqsQf3/sfRMyxl5dn5Sz29f49EzFgfVp+t:WrS2LXjIpyDS3/0aWfmC
Score1/10 -
-
-
Target
Rebel/FastColoredTextBox.dll
-
Size
323KB
-
MD5
8610f4d3cdc6cc50022feddced9fdaeb
-
SHA1
4b60b87fd696b02d7fce38325c7adfc9e806f650
-
SHA256
ac926c92ccfc3789a5ae571cc4415eb1897d500a79604d8495241c19acdf01b9
-
SHA512
693d1af1f89470eab659b4747fe344836affa0af8485b0c0635e2519815e5a498f4618ea08db9dcf421aac1069a04616046207ee05b9ed66c0a1c4a8f0bddd09
-
SSDEEP
6144:0R0J4lx4/7BA4xvNdcwCOg04j0y5mwZkdmsqmLDi5eNH+Dl1SIP0:0R0J48lAovNd7CO34D4b4eNO
Score1/10 -
-
-
Target
Rebel/FastColoredTextBox.xml
-
Size
132KB
-
MD5
70d49dec6a333f1d94fb1e77c663525c
-
SHA1
184b544e672f4c4cb9ed9cf010da568eed16623d
-
SHA256
f3f2e537065317b6ce66dac64042e925bbcea65f00561f9860b7172c9ca07027
-
SHA512
b78a3c4418a7c5014eb16e72f2113f00353e9e566942f7160067c826c47f1ec2752ae7ede796fc159fb9bae499d347f822401fbc4446e2556cbd680cd595c2e2
-
SSDEEP
1536:45SVw7sekyF7o//t3zEzacGE5xa5lIV1/P5:45Sm7sekyxo//xzEz3GlM
Score1/10 -
-
-
Target
Rebel/ReadMe.txt
-
Size
13B
-
MD5
1c6c20f0c324e98e38272f1245d24e11
-
SHA1
bbb5dc3a18a532529ec6fa88c86542288dd979f7
-
SHA256
4ca7414e2aba6d74826403afb6ccbcc1752297a1b61aced8808b75d80d212f2d
-
SHA512
a30aed5a54580ad73f16ad237f82e2dc99c99d9645d40d1fbdf88a7d6c10c238b6967c011ba46c6084d409e4a37b41983d600146f93cd9250a810b7d784d8246
Score3/10 -
-
-
Target
Rebel/RebelCracked.exe
-
Size
12.0MB
-
MD5
f000635d073452067c4cb62e5b86dc89
-
SHA1
9b0738a6b5ef860f99b1c1c63051ec9df64c00ad
-
SHA256
11b8d77615bf67f99ff344792f5739eb73157866f548c59ebcfcac70d5a6ef88
-
SHA512
ae3627afaf1678cf9707ebc97aa0f052ec9cda45e278edc8ca58236ff39c034f65d5391071545188bbe8ea5a6ca863cf9a52c03e334d7edd2f52889d25ebf6e6
-
SSDEEP
196608:pUOSVLnGmLiOwurZtOtvPpEujDSRZjBybLqDDFZhZNSvg23fQnXXOw8sUl6Q/+qS:peVLGQiJurZtO71jDSvVyXqfFbZCbQfL
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Rebel/System.CodeDom.dll
-
Size
30KB
-
MD5
59c830ac0d99f8c906292de85f804b84
-
SHA1
68b6740e6ce97de8b1398f3a6e320940a0e16458
-
SHA256
e8c88b0448083663910587efeacb6a1977749fe3ffe83b263fc01f7b63d7dfd2
-
SHA512
4028fa6b68eb3a48bb9625e6755c8e3022283694bb603905af3db54c31bc2f7291aec11f7c42a033703f84c3ff265a19416eb8798058cc42ee3c14c633e9588f
-
SSDEEP
384:FuE8ujCiLMTPji3h8241EEqYC0iIcwBxehzsCtZ7U6r1fDMqyt5/WduWTTb2HRNq:FDBCi4TWaveEqYChzZpgRoj/iP9zgBV
Score1/10 -
-
-
Target
Rebel/System.CodeDom.xml
-
Size
366KB
-
MD5
91af6294c77371e6773c35cfa7edd068
-
SHA1
0c24bfafb91ab69a3a7a4bfbd15a9c346341c487
-
SHA256
92287105a0987fc6ea2404e799da13f2d57b228a1fa3039a6d0cded00d4344c5
-
SHA512
bdfb5c13ee54b88d029bae6a65f932bcf27b1d71a5c373325b2e7484d21d49745c2f3983da85d50aeb6e31febbf0bfcb3cbe46415bae15877c20d54522b65904
-
SSDEEP
1536:l2e3vRrYxV4Tm0/Y/LFC9YmXVT2Y3mBhuzRKqn/gCOIFnffP6Ks5ATTglg2PLaAR:lK+c9
Score1/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1