General

  • Target

    096a724b73844a24f24291a04110dbe41aaa0804c88bad56c394d10110b197ce.exe.bin

  • Size

    11.6MB

  • Sample

    241028-xl8njsvelb

  • MD5

    5e196bfce5ffe8fa90787826a353af2b

  • SHA1

    30ff3caa37b4c43c33360397b302e35100e3dad5

  • SHA256

    096a724b73844a24f24291a04110dbe41aaa0804c88bad56c394d10110b197ce

  • SHA512

    043f1f5d45a24a77accd5ce6e745a4fc29afc3df2095ab4feabec98968bb65710cb1d5de76dcc69f8f21a62130a37ab144b798c780fb69a0dcb6c5ca41c5809c

  • SSDEEP

    196608:Vh1jlzPAxlz2Jp5UfLuseNvX+wfm/pf+xfdjSEqR1ZWKsnqrIWOzW0DaqkH:haxh2Jp5MivX+9/pWF8NRnBsnqrIWeRE

Malware Config

Targets

    • Target

      096a724b73844a24f24291a04110dbe41aaa0804c88bad56c394d10110b197ce.exe.bin

    • Size

      11.6MB

    • MD5

      5e196bfce5ffe8fa90787826a353af2b

    • SHA1

      30ff3caa37b4c43c33360397b302e35100e3dad5

    • SHA256

      096a724b73844a24f24291a04110dbe41aaa0804c88bad56c394d10110b197ce

    • SHA512

      043f1f5d45a24a77accd5ce6e745a4fc29afc3df2095ab4feabec98968bb65710cb1d5de76dcc69f8f21a62130a37ab144b798c780fb69a0dcb6c5ca41c5809c

    • SSDEEP

      196608:Vh1jlzPAxlz2Jp5UfLuseNvX+wfm/pf+xfdjSEqR1ZWKsnqrIWOzW0DaqkH:haxh2Jp5MivX+9/pWF8NRnBsnqrIWeRE

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks