General
-
Target
ElectronV3.zip
-
Size
37.5MB
-
Sample
240929-xdcadawalk
-
MD5
04e52001777520b11f2cf00c84e8c127
-
SHA1
05d234917dfb6d1d7ba796ab1562325459ab99a3
-
SHA256
3e783b5a0ca45a430bfc7e7cee4d4331abd55d91e0da870daf724e24bf812b6f
-
SHA512
485d40ace72e1614ecdae4182806346a34d0d88b57d25dcdcf7f4b4296426f16352d1eb3515832bf8a518a56d82b650936b2c257a8f53ac6e620c3d2b23b9d13
-
SSDEEP
786432:KbWnRUP52xx4kNDAzhANMRICKL+m077XzjgqqXOkt2I2BpdGNgj3pexBQ:IuGP52xxnghA0IdcYXOwcBp0EexBQ
Behavioral task
behavioral1
Sample
ElectronV3/ElectronV3.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ElectronV3/ElectronV3.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
ElectronV3/ElectronV3.exe
-
Size
37.8MB
-
MD5
3b3a67fbdef30c60edace57f0879f62f
-
SHA1
b80ec72cd264e01798ba523fbb3cd76655663e21
-
SHA256
c277b4a4e4e38ec0667f01e9486eeb516caf589e24b7c573852dbc555c162666
-
SHA512
b1d4dba1f15ca87a1140e8ce7a21e791adbea46d525de549c46aa9128d12605e7eee1b1d4dbe5971604a5f0a2bca4a181579ecc54abcb080006f60bcd1ffe976
-
SSDEEP
786432:vpE/xQlr4/n82Vf0ZpGRexsQGj22uJBxffo8CXIs5qiI7/7K4rv3Fqb1:hc2lr4/n9gpGash48XIeG7/GUqb1
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
2System Information Discovery
4System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1