General

  • Target

    Hellion.exe1.zip

  • Size

    11.1MB

  • Sample

    241028-yczvqatkhv

  • MD5

    6f18cf1a001ee8b8f63b0656027419c0

  • SHA1

    a38a1477283e06305206a1af44f0001871998419

  • SHA256

    61727c63f5f90817db6c6c2acd39e3318ddb391a2fd5df7d6e912ce11ce6b1b7

  • SHA512

    db436ed05ded017976678292c8cef23330d37a94ad0e97ee19833666de00090544ba241db030fa30d831407b99b54e863d13005273f68c1ef90d1d5c5f14385d

  • SSDEEP

    196608:Oe6ssjn8xru+clAXQ4r9wXp+OToOsNBrufoo2HJ2GZ+viFbYNae4uSp9WpRNAW5x:GsC8NPXhiZ+OoHgVS+qFcNae4uSEnV

Malware Config

Targets

    • Target

      Hellion.exe.bin

    • Size

      11.2MB

    • MD5

      820c6965214acd43b76e4e3284c0b20b

    • SHA1

      610720cb6b74a5607572fbe0d5c7ddfecdcba425

    • SHA256

      f2f8d895bf14040bea035eee3949106730df11d5eb525dd543e988b40483389f

    • SHA512

      157370fb150370240781bd14fa4f671002d0beb030db29f1520a86fdf9693c640fa4bd4806c5627df0d7fbfd379117f8a711e4ff0b5100743d2e0078a3bea9d6

    • SSDEEP

      196608:aJRz+b4RwkU3b01Kpn3V+uq+VvpHxbAQvemuEtwq+ZkiKDISc7x0vaMLw0d2:yp+t3L01+l+uq+VvFxv99aq+ZkFYx05L

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks