General
-
Target
xero.exe.zip
-
Size
9.5MB
-
Sample
241028-yk8gtswblc
-
MD5
6b191f70a5e2088089e9471eca5fdd4a
-
SHA1
6ae05d23c4ebc70f32987a6c7c72043d6780c32d
-
SHA256
92763eb4ab56f29f4f06e66c91bb7d58ed2f7f6c024612578d38cd50f1da800e
-
SHA512
7130754134e621151812dd759d0da8a94276578c23896c8bb60b958c61f71acb56da4de8e8972137fa663526d511c915a7618ff84d561e3c478a803639e02a3e
-
SSDEEP
196608:TS7dgH0sJtNXa61d9Ldcma93H0ikeOFXPljJhQH4YMKLW3QgE:TS7dgH0sXNX51nidGvPgG1E
Behavioral task
behavioral1
Sample
xero.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
xero.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
xero.exe.bin
-
Size
19.6MB
-
MD5
51a59b84b382c87fb5afb6f793c51af0
-
SHA1
3e1ce55d1c0f5dcff9f72a8d34a9d32a7710f009
-
SHA256
48033a75dbddda6de878f156a02550e5769225b36a4ebb8af70b60c1e2f0044b
-
SHA512
ac4cf466ac5476f13c28514c1afcb8a97162ddf2f6ae6ec4a77aa8253776759610f67086e27f3d31f2191a752944a813ac7c6f596e1fc251d65d91c7a3116782
-
SSDEEP
196608:uKJOErIxPR+0Jb3tQk5t3eNsHFJMIDJ+gsAGKkRpg70wKK:/JOE87v5tEYFqy+gs16p
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1System Information Discovery
2System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1