General

  • Target

    66dc12a854b4e1dc8b1a4d3517eea56a04234ce13ed6aa4642921322928c96c2.exe.zip

  • Size

    11.7MB

  • Sample

    241028-xqnh6ssrbv

  • MD5

    b0cd13c6f9cbb66620f372f76c537cbe

  • SHA1

    ff829bce9ddd914c0a3edda3a4f386691adec240

  • SHA256

    45013305a27ddcf3e9d9f07ec91a96c13672eace4da3640d8251e870b03c90db

  • SHA512

    fdff842e46c55bdff811187ee1482816344644b886054a9d0cd06b0c188b757b278591c84c0479ce9534e3c539925b42dbffe46606f6cb159e310cb7d8d83419

  • SSDEEP

    196608:2MJd+L/3nU6n8SwdZACXxINzKLBUJIP4xvtYgLRy+1dv9kLw6+9DSRY2bi8q/fgO:Hdx+oLXx4U4htY+79R6y2byfj

Malware Config

Targets

    • Target

      66dc12a854b4e1dc8b1a4d3517eea56a04234ce13ed6aa4642921322928c96c2.exe.bin

    • Size

      11.7MB

    • MD5

      2e3c92b0fef03f9cf87c3dacd8bfe6dc

    • SHA1

      65fccf614953d38a454138daf8449ee824a37cf2

    • SHA256

      66dc12a854b4e1dc8b1a4d3517eea56a04234ce13ed6aa4642921322928c96c2

    • SHA512

      0f037ed603392f718664dfd8465cc57642d47f5fea85f3e06fe0c4f235f91f76ebc8a7e70e23ac388cffcdd85e49051542d5ea0a12cd4f0242b6fccdfef699b9

    • SSDEEP

      196608:NfDFV4lFoxZupaiSrZOH+eWRIStQvbd4r/JdsEKR+4WUAofZXDO1iUjGgKJ:NrsMTroHyRIzvbqroFR+4WDofZXD25Gv

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks