General
-
Target
ElectronV3.zip
-
Size
9.6MB
-
Sample
241111-2alf4ayamq
-
MD5
20e23e39f5bc2960dc22467843ef508f
-
SHA1
656e80a3f06734299f77b79ef7476f8a0e87b7f9
-
SHA256
17a1a20884741269ebf3bc8e594192d7a71550ff2db2e95d955f90a57e09a238
-
SHA512
5718e5bd95cf74a6fdf0c6699f32f0260995bcdb9d31cb0a3a66e32aaea58a2568a232176689365e0c2590c4f8e51ca8e521bd7eff5b23f1fac750f4ffbcada0
-
SSDEEP
196608:HhZt2jZs54OftzfklzJZUDiq5HNKW5+FUhlb9q1wHWhozdGJd3/AW9uGq8iJ:BO6tKzJSz5HZZlBq1wHUozdGJvuF9J
Behavioral task
behavioral1
Sample
ElectronV3/ElectronV3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ElectronV3/ElectronV3.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ElectronV3/ElectronV3.exe
-
Size
9.9MB
-
MD5
fb378cce904aa88ef75e6b3e23d3570c
-
SHA1
fb0e5807e9f585d6a366b983aecedd33e4db5e1d
-
SHA256
7ccdd35fed305775ea2ce064c5358aaabc386db052d8d35ada9e49ccc2c779c5
-
SHA512
3ca77a7a3d6df9f17577344f1d35a67dd5800a9edac6d45d2a88801ebf913dcd6491c788045d82cce18c45a9885de88f36c2483805e445ba065f8157c8f1b31b
-
SSDEEP
196608:91Rpe1xh0/TLx4hz7DIxygRHvUWvothxjno/w3iFCxHQbRpXI2rWxU0:324TGz7kFRHdqxro/w3uCxHQb9WxH
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
1System Information Discovery
3System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1