General
-
Target
83154f0731104f82b198eb13465dfa57.exe.zip
-
Size
10.2MB
-
Sample
241028-xscjpavglm
-
MD5
a116e71a9d8e5d50b9b27e855db27901
-
SHA1
fd1a1ebce7f21eca5e8aa1654791e1a870f79c09
-
SHA256
70b8068c3f07af12375b1a16aeeb1b59d3e3adac8d015ebc364d6db5828b257c
-
SHA512
26f1457b77bd0004309c3b0d81b1ffe08337e2a3c1414381e0ce7ee8fd7d2cb11fa630b25331af5a06ce6d5048ff00409cef18dd56ccfbfb59ee13a556f375dd
-
SSDEEP
196608:qyPC4Gmfo0Iw7rzD1r0YrllCozv1HpEzyhaAFuWyZ7hA+O:9PC4GmDd0UlF7VO2hZgn7y+O
Behavioral task
behavioral1
Sample
83154f0731104f82b198eb13465dfa57.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
83154f0731104f82b198eb13465dfa57.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
83154f0731104f82b198eb13465dfa57.exe.bin
-
Size
10.3MB
-
MD5
83154f0731104f82b198eb13465dfa57
-
SHA1
4462abc937541f0bde333e23b8b211dd34a3a641
-
SHA256
54b94ac48454677fbf054ed12e93be43702df08e5376d9d547216e3cb75cb36c
-
SHA512
0a07ab2d9ef0a471b2defa579e5f61692629b0c678ba20c735eee5a0ccd26e8607a28ed684e816d2a411d2a9a089167c511e7ee6241bc1ffa50c45b9674579ec
-
SSDEEP
196608:WzlKAYZL/TLx4hz7DIxyueNt+wfm/pf+xfdkRulTWKqrIWOkWKDaqkHu:qbYZrTGz7kQt+9/pWFGReTBqrIWb7aDH
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1System Information Discovery
2System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1