General

  • Target

    Exela.exe

  • Size

    11.6MB

  • Sample

    240915-rrfl3axemg

  • MD5

    0299dbed53ad0104eb7ffd35b5c86aa7

  • SHA1

    b35f17d76268ab8a3df79bbd418a7b94dd088f1c

  • SHA256

    83d619ddcc6658d2f8e29a8d763d30bb3f3bc34dd9d5306dde8ad50891240213

  • SHA512

    b804775a5ed8856d6f51fbe44e3ece64a9de30a8701e244070f3fd6d7e3df16e4a7c2c641a142523e1113f9336a7eebf162f03f5ba3e70604506c20fc8fdb34b

  • SSDEEP

    196608:MApKAYZK/TLx4hz7DIxyueNt+wfm/pf+xfdjSEqRulTWKqrIWOkWKDaqkHu:BYZMTGz7kQt+9/pWF8NReTBqrIWb7aDH

Malware Config

Targets

    • Target

      Exela.exe

    • Size

      11.6MB

    • MD5

      0299dbed53ad0104eb7ffd35b5c86aa7

    • SHA1

      b35f17d76268ab8a3df79bbd418a7b94dd088f1c

    • SHA256

      83d619ddcc6658d2f8e29a8d763d30bb3f3bc34dd9d5306dde8ad50891240213

    • SHA512

      b804775a5ed8856d6f51fbe44e3ece64a9de30a8701e244070f3fd6d7e3df16e4a7c2c641a142523e1113f9336a7eebf162f03f5ba3e70604506c20fc8fdb34b

    • SSDEEP

      196608:MApKAYZK/TLx4hz7DIxyueNt+wfm/pf+xfdjSEqRulTWKqrIWOkWKDaqkHu:BYZMTGz7kQt+9/pWF8NReTBqrIWb7aDH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks