General
-
Target
e9e59ca2c8e786f92e81134f088ea08c53fc4c8c252871613ccc51b473814633
-
Size
89KB
-
Sample
241028-x2t54avhpm
-
MD5
b53eee189e09945c07a464d82be57e4e
-
SHA1
93bf21ecb240ba177734600f6eef642f8a41f229
-
SHA256
e9e59ca2c8e786f92e81134f088ea08c53fc4c8c252871613ccc51b473814633
-
SHA512
6a7bc4d1447f5cc906152c591e1f2737c22059d1915febcbe8906eb9fcf2da3e9b33de215ce4498ed01024b57a7e12e9801c4907ca4109e01f94180545782a61
-
SSDEEP
1536:EOrgQySDTYowOxhyR999vAFH/N1k7SZCHvqxuV/QHzw4iQMTq:uGMt999vUHF5ZCHvguV/QHzw2MTq
Behavioral task
behavioral1
Sample
e9e59ca2c8e786f92e81134f088ea08c53fc4c8c252871613ccc51b473814633.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9e59ca2c8e786f92e81134f088ea08c53fc4c8c252871613ccc51b473814633.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
exelastealer
https://discord.com/api/webhooks/1152920158470414406/e6cZMhR2c46WKJhAHuxbkYiUUJtxA61zPHZaJSHYHMBE8RWYV1mQZ1ZfleRCDXbyLf_t
Targets
-
-
Target
e9e59ca2c8e786f92e81134f088ea08c53fc4c8c252871613ccc51b473814633
-
Size
89KB
-
MD5
b53eee189e09945c07a464d82be57e4e
-
SHA1
93bf21ecb240ba177734600f6eef642f8a41f229
-
SHA256
e9e59ca2c8e786f92e81134f088ea08c53fc4c8c252871613ccc51b473814633
-
SHA512
6a7bc4d1447f5cc906152c591e1f2737c22059d1915febcbe8906eb9fcf2da3e9b33de215ce4498ed01024b57a7e12e9801c4907ca4109e01f94180545782a61
-
SSDEEP
1536:EOrgQySDTYowOxhyR999vAFH/N1k7SZCHvqxuV/QHzw4iQMTq:uGMt999vUHF5ZCHvguV/QHzw2MTq
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1