General
-
Target
setup.exe
-
Size
11.9MB
-
Sample
241203-wdlndawmdv
-
MD5
7037dbfc90296b0a97e074aac96afe19
-
SHA1
2d467f8f77017dec8d7d233a087f9edee685441b
-
SHA256
fd580c9efe16984c6113f3e12bc42c13291d72a536ebb7376753fc8270ef8fa9
-
SHA512
6eda9e01b1117e8121ccc90e75a67e57f7060b234cf26c172c8788111ed5463027a41c9a086f03d481d04e56533a2d2690f4d71905e4ef5c6a7d4f4d6f12892a
-
SSDEEP
196608:NKl0m2FC/KABcemXyuSyTde87eNK+wfm/pf+xfdjSEqRjzE7iU/MtO3cQK/iQMMu:E6mvlDtByxjgK+9/pWF8NR+iU0trVih9
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
setup.exe
-
Size
11.9MB
-
MD5
7037dbfc90296b0a97e074aac96afe19
-
SHA1
2d467f8f77017dec8d7d233a087f9edee685441b
-
SHA256
fd580c9efe16984c6113f3e12bc42c13291d72a536ebb7376753fc8270ef8fa9
-
SHA512
6eda9e01b1117e8121ccc90e75a67e57f7060b234cf26c172c8788111ed5463027a41c9a086f03d481d04e56533a2d2690f4d71905e4ef5c6a7d4f4d6f12892a
-
SSDEEP
196608:NKl0m2FC/KABcemXyuSyTde87eNK+wfm/pf+xfdjSEqRjzE7iU/MtO3cQK/iQMMu:E6mvlDtByxjgK+9/pWF8NR+iU0trVih9
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1