General

  • Target

    xero.exe.zip

  • Size

    9.5MB

  • Sample

    241028-yk8gtswblc

  • MD5

    6b191f70a5e2088089e9471eca5fdd4a

  • SHA1

    6ae05d23c4ebc70f32987a6c7c72043d6780c32d

  • SHA256

    92763eb4ab56f29f4f06e66c91bb7d58ed2f7f6c024612578d38cd50f1da800e

  • SHA512

    7130754134e621151812dd759d0da8a94276578c23896c8bb60b958c61f71acb56da4de8e8972137fa663526d511c915a7618ff84d561e3c478a803639e02a3e

  • SSDEEP

    196608:TS7dgH0sJtNXa61d9Ldcma93H0ikeOFXPljJhQH4YMKLW3QgE:TS7dgH0sXNX51nidGvPgG1E

Malware Config

Targets

    • Target

      xero.exe.bin

    • Size

      19.6MB

    • MD5

      51a59b84b382c87fb5afb6f793c51af0

    • SHA1

      3e1ce55d1c0f5dcff9f72a8d34a9d32a7710f009

    • SHA256

      48033a75dbddda6de878f156a02550e5769225b36a4ebb8af70b60c1e2f0044b

    • SHA512

      ac4cf466ac5476f13c28514c1afcb8a97162ddf2f6ae6ec4a77aa8253776759610f67086e27f3d31f2191a752944a813ac7c6f596e1fc251d65d91c7a3116782

    • SSDEEP

      196608:uKJOErIxPR+0Jb3tQk5t3eNsHFJMIDJ+gsAGKkRpg70wKK:/JOE87v5tEYFqy+gs16p

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks