Overview
overview
10Static
static
8Exela-V2.0...1).zip
windows7-x64
3Exela-V2.0...1).zip
windows10-2004-x64
1Exela-V2.0...on.txt
windows7-x64
1Exela-V2.0...on.txt
windows10-2004-x64
1Exela-V2.0...ela.py
windows7-x64
3Exela-V2.0...ela.py
windows10-2004-x64
3Exela-V2.0...ICENSE
windows7-x64
1Exela-V2.0...ICENSE
windows10-2004-x64
1Exela-V2.0...obf.py
windows7-x64
3Exela-V2.0...obf.py
windows10-2004-x64
10Exela-V2.0...E.html
windows7-x64
3Exela-V2.0...E.html
windows10-2004-x64
3Exela-V2.0...px.exe
windows7-x64
5Exela-V2.0...px.exe
windows10-2004-x64
5out.exe
windows7-x64
out.exe
windows10-2004-x64
Exela-V2.0...der.py
windows7-x64
3Exela-V2.0...der.py
windows10-2004-x64
3Exela-V2.0...ll.bat
windows7-x64
1Exela-V2.0...ll.bat
windows10-2004-x64
1General
-
Target
Exela-V2.0-main (1).zip
-
Size
578KB
-
Sample
241012-fsm7razblr
-
MD5
1284123a329839e8c0f2db4687ab0de4
-
SHA1
f02e5610c7038857d1be6dfb2ca85daeb7a90f79
-
SHA256
f918a13dc2c83df5da9e9243a4f39420a40314c39982af4b4d402001e0968e39
-
SHA512
7313649e5f0c4eee7c2001ff531faf77c16408d44dee655e9185f9110e75f220afd5757f764faf05f9f385c42283050dc41668866c6e14100d9a656a15bc63fc
-
SSDEEP
12288:wBfguFY+SdywXfBslqY7b9ukR6lurtTLS+28Ym52hpKD6OFjIZfgWflLawb:afguFY+SXXSlqmxp6wtTLl27m5wp0fpc
Behavioral task
behavioral1
Sample
Exela-V2.0-main (1).zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Exela-V2.0-main (1).zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Exela-V2.0-main/AssemblyFile/version.txt
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Exela-V2.0-main/AssemblyFile/version.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Exela-V2.0-main/Exela.py
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Exela-V2.0-main/Exela.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Exela-V2.0-main/LICENSE
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Exela-V2.0-main/LICENSE
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Exela-V2.0-main/Obfuscator/obf.py
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Exela-V2.0-main/Obfuscator/obf.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Exela-V2.0-main/README.html
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Exela-V2.0-main/README.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Exela-V2.0-main/UPX/upx.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Exela-V2.0-main/UPX/upx.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
out.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
out.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Exela-V2.0-main/builder.py
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
Exela-V2.0-main/builder.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Exela-V2.0-main/install.bat
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Exela-V2.0-main/install.bat
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Exela-V2.0-main (1).zip
-
Size
578KB
-
MD5
1284123a329839e8c0f2db4687ab0de4
-
SHA1
f02e5610c7038857d1be6dfb2ca85daeb7a90f79
-
SHA256
f918a13dc2c83df5da9e9243a4f39420a40314c39982af4b4d402001e0968e39
-
SHA512
7313649e5f0c4eee7c2001ff531faf77c16408d44dee655e9185f9110e75f220afd5757f764faf05f9f385c42283050dc41668866c6e14100d9a656a15bc63fc
-
SSDEEP
12288:wBfguFY+SdywXfBslqY7b9ukR6lurtTLS+28Ym52hpKD6OFjIZfgWflLawb:afguFY+SXXSlqmxp6wtTLl27m5wp0fpc
Score3/10 -
-
-
Target
Exela-V2.0-main/AssemblyFile/version.txt
-
Size
1KB
-
MD5
b13f73267d6a3e865a941bf7bb817d19
-
SHA1
d316522907e81cc1a276e9ac8f31ffd3fbfda75e
-
SHA256
5c7da4bf53b1ebda26683c75e5c03d1d062683d4f1af10db939ba334787136cf
-
SHA512
cd1fa569e55c490d0546a50b6dfecbc3ca265fba8566c33d25bd3e6d173366781d0dc1d11bcf5606322ba64926fed815c3d54184357c4afef72647cda89aa274
Score1/10 -
-
-
Target
Exela-V2.0-main/Exela.py
-
Size
140KB
-
MD5
53d0f2edf910d03bf6a5b2a2806adf02
-
SHA1
48beb9f2cca54ffc5e19c829bcaf03b167ea7eb4
-
SHA256
ff0b26b330f3bddc1a9eba6dae2bc4f8609fc85592f8f3c6344f2907a7a57cf9
-
SHA512
f4cb0a556441097021a53c09105793fc7cca4240b1471a486b665849fd2d498afb007485bec284b02e4a68aec012e6e4b6b31a6e56ac712a925e66d76008b866
-
SSDEEP
1536:7iYj57SAiFZ49jKyZrwnuHHAz2yv07Q5lnpO0yZdaC12J0vGULqDDC/+0M4ToxK8:B7JWewygludaC2JwNYC/+sl/0
Score3/10 -
-
-
Target
Exela-V2.0-main/LICENSE
-
Size
1KB
-
MD5
f57ba58cdbeb92901c54411f17778ecf
-
SHA1
c8a7afdaf560972b15d3455b1634ffbee230c7ff
-
SHA256
61942d31cc5c5791bf214fbab7de4649fb4d15d5e058b2646d9ffbf40bffcac5
-
SHA512
536c29c8ab24fc4b03fa153cc79189a42c5eb9febb917c3460b342f93c35ef83c52e0f5f0e042dd7a25eff612094616c96e9bd9aee42423d7edc158f61701bfb
Score1/10 -
-
-
Target
Exela-V2.0-main/Obfuscator/obf.py
-
Size
6KB
-
MD5
bfbf108641c41832ac8584a6b85960cc
-
SHA1
978719dd1d5bf0c64138d1b5082bd2952fe99f5c
-
SHA256
2ba721b0f3311123399cfa098502ad53cfa4e8e0fe6ce0de65ed2c84ea1c1101
-
SHA512
5084d394f375de4e741da68c35387793496c8c7c7b178c40cbfa3c50fa91e99cb28cace978ca9abb4155d68adc94ef6106ab690a808285eb3e9e27e23f10a1a8
-
SSDEEP
192:wtcWEKm7AwfMIB/fGPEPPP8PEPyPkP/PyPfPyPtPyPaPyP+PyPMPyP5PPP8PpPyV:qpm7AQDNGPEPPP8PEPyPkP/PyPfPyPtw
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Deletes itself
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Exela-V2.0-main/README.md
-
Size
7KB
-
MD5
5a9c53cab4888a16488776dabaa8ffa0
-
SHA1
819665cd8bf93032d177243a8c88a0414a5f67de
-
SHA256
862c3d6ddfa842f83fc5106366c8e761edda554dcb6e1d8c54b7078995c49e31
-
SHA512
f3cc668d6994c2877bb3ba86f1a49d2535656f030c25aae4a1ec101cf0ab7b4e78414ef00a0b0c820a9870145fc297ae4072c7711ccefcc1057435194a3ed274
-
SSDEEP
192:vSWDPtBfIaR6kBxowZq3THlWmpBwBOXoslY705N:vSWDVBfIaRBxowZGTHlWmIUXTYAj
Score3/10 -
-
-
Target
Exela-V2.0-main/UPX/upx.exe
-
Size
550KB
-
MD5
39ecdf78cb357513d1fd565c5e9edbdd
-
SHA1
433bb8e090e48ea304c89bab1bf1b5defaaa08d7
-
SHA256
1ea92da93eeaf4d456114b847b9bddfb47ef854e7c24143f290d5e3f44973e91
-
SHA512
e83f04a8f7f5ffe257747f5b294d17d386ce700f4c59afa6ab9c4995be8ae33d34add425472722538c429ea0decd797393d5316d620df6d2895c2930e2474efb
-
SSDEEP
12288:G5ngMB4arMslBeWZdK8hXN4f0K2YQpDZOBEVOEA/ToKrkW1A9N3:G9g349lPZdZ8Mg6+hB
Score5/10 -
-
-
Target
out.upx
-
Size
2.0MB
-
MD5
d1c154f7759560c82691959e4f68fd19
-
SHA1
60481cd8a6ccfc3d4a38992725f0e2315b43ff8f
-
SHA256
7b9d20097706b569d6e183372cf433739d9dedc2dcd5f955d8906f6b18e123f9
-
SHA512
a5fa3ea28026197bc5436a0b7dfe0d6e9a46a36e3c1e3de853bc1ba9caa157f100151dc14de196101953d3491bf407e4a519d4fc2e65ac0c08b5c47b4f5f780e
-
SSDEEP
24576:Wwdc9ilRcNNifj+Wf5jgz+8K7Ik66dT3gR/prvCHtg6HzRziD:WAlRcNNDy8IIktwvCRz
Score1/10 -
-
-
Target
Exela-V2.0-main/builder.py
-
Size
9KB
-
MD5
c334e5c6dbdc27f8e8b48d1dac286f23
-
SHA1
4bc5853e91ad009c82efb16b8b4db489ea762995
-
SHA256
27ebc271f47bd76b63b5f3aa36b7f0587f3bd543c9ca5e0e89719df54ef82f73
-
SHA512
2de1d4879194e664d5d0911d1c36b6bf7c89fc25e86890e7028398c657ecb667564df08db7d7436a04a3cf7b1db30eb8ecd252b71281ca7b1523139871c47a13
-
SSDEEP
192:+m8jnYv13epp3UfI2Pa/fcjzgLu1krJUPjDxsOl/Zapl:+m4nM1upp39V8ELblU7DxsOfw
Score3/10 -
-
-
Target
Exela-V2.0-main/install.bat
-
Size
877B
-
MD5
cd480b40656a01015f5c7e16832d3384
-
SHA1
c446c9cb3a534d9ea432916bbd04b466a07d4521
-
SHA256
c2863c67203376c14e8f2c64e16f65185d2f1272c75fe9d6b43f301ad1181d64
-
SHA512
0504e98fbb276374b9c3aa8edab36154b412934269d1cda99e8b0742c0f1071326cc3ad5e08e51446421dcedcce362ef6d51e22461a4267ed92f3abba0e87576
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Peripheral Device Discovery
2Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
5System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1