General

  • Target

    Hellion.exe.zip

  • Size

    11.1MB

  • Sample

    241028-x9ds3swamr

  • MD5

    d4fc8aa63d3831cb05b529125dfd1198

  • SHA1

    eb0ae8b23c7e734c39cd8f0079b8d29cee87ec77

  • SHA256

    9c381ba1c5fd05792f8481544c12195f94512bfe2d5de634a8fcf1e17975853b

  • SHA512

    9b920cde21e9a9c742f4f17555b6236ade87a962842c09546ef15fd7e7721ca248dc97ea755de3b59ebb65fc63346e02bbadbbd9d3d4438247e693b8175a5edf

  • SSDEEP

    196608:fuI05Kz8Z1wXACiApgYKSNVQQURyRjmJc6SOeqh3fKHecU+qaZ7YB50d8Psv:2j5t6iIr98NRyRiJc6SWhPKHev+vZUBy

Malware Config

Targets

    • Target

      Hellion.exe.bin

    • Size

      11.2MB

    • MD5

      820c6965214acd43b76e4e3284c0b20b

    • SHA1

      610720cb6b74a5607572fbe0d5c7ddfecdcba425

    • SHA256

      f2f8d895bf14040bea035eee3949106730df11d5eb525dd543e988b40483389f

    • SHA512

      157370fb150370240781bd14fa4f671002d0beb030db29f1520a86fdf9693c640fa4bd4806c5627df0d7fbfd379117f8a711e4ff0b5100743d2e0078a3bea9d6

    • SSDEEP

      196608:aJRz+b4RwkU3b01Kpn3V+uq+VvpHxbAQvemuEtwq+ZkiKDISc7x0vaMLw0d2:yp+t3L01+l+uq+VvFxv99aq+ZkFYx05L

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks