General

  • Target

    096a724b73844a24f24291a04110dbe41aaa0804c88bad56c394d10110b197ce.exe.zip

  • Size

    11.4MB

  • Sample

    241028-xpb4ravenb

  • MD5

    29638af1e70921786b6230cad4e8ed4a

  • SHA1

    e32b7016c0f8b7f4a7e51d39187870e61f77aa82

  • SHA256

    cebbdd512d5d1f5708f9edfaaaca0099e0b4e5300477df30782543dd145ef5e4

  • SHA512

    ec8dfb120239aa3c05a6210bcc13521cc98b9261d4abd4b279e04a562312be2c43f769c2f78a1197fd1dbf8b6dfdb98ac1cd9ead9fd2169b3d614f88ee2e234c

  • SSDEEP

    196608:KMHGMNkS0+g5jRoAoIZz1S+j9TzNdQ3/tBY6hKr6GhZfTSy+TcfC0t3ABpjo:jtCUU1SuvOe6wphp+TcK0aBpjo

Malware Config

Targets

    • Target

      096a724b73844a24f24291a04110dbe41aaa0804c88bad56c394d10110b197ce.exe.bin

    • Size

      11.6MB

    • MD5

      5e196bfce5ffe8fa90787826a353af2b

    • SHA1

      30ff3caa37b4c43c33360397b302e35100e3dad5

    • SHA256

      096a724b73844a24f24291a04110dbe41aaa0804c88bad56c394d10110b197ce

    • SHA512

      043f1f5d45a24a77accd5ce6e745a4fc29afc3df2095ab4feabec98968bb65710cb1d5de76dcc69f8f21a62130a37ab144b798c780fb69a0dcb6c5ca41c5809c

    • SSDEEP

      196608:Vh1jlzPAxlz2Jp5UfLuseNvX+wfm/pf+xfdjSEqR1ZWKsnqrIWOzW0DaqkH:haxh2Jp5MivX+9/pWF8NRnBsnqrIWeRE

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks