General

  • Target

    49f4789274e5c0dcd4d2cc1b850761353bf8b72e819d12df5c376fd665da1283

  • Size

    10.7MB

  • Sample

    241209-smj95a1rgy

  • MD5

    cd463d16cf57c3a9f5c9588a878a7213

  • SHA1

    ef22c2b11efc0bc6a739b82f9a26edaee9348b8f

  • SHA256

    49f4789274e5c0dcd4d2cc1b850761353bf8b72e819d12df5c376fd665da1283

  • SHA512

    5b20ce36b15f5d002d183850032067b11f811544bac19e0a76340df47294d0b059fa8dc43fedd8480d6f72eb8357d01924dbe9cbebdaac1625c5f4f498392822

  • SSDEEP

    196608:1a4vbUQYRyS/Kh44vTM1NExeka13ZlfNf5PWwShXBFPHIG1MZBwYFCnvkC2:7vDX0gZvT2U/S3ZllEhxFPIG1rYFC8C

Malware Config

Targets

    • Target

      49f4789274e5c0dcd4d2cc1b850761353bf8b72e819d12df5c376fd665da1283

    • Size

      10.7MB

    • MD5

      cd463d16cf57c3a9f5c9588a878a7213

    • SHA1

      ef22c2b11efc0bc6a739b82f9a26edaee9348b8f

    • SHA256

      49f4789274e5c0dcd4d2cc1b850761353bf8b72e819d12df5c376fd665da1283

    • SHA512

      5b20ce36b15f5d002d183850032067b11f811544bac19e0a76340df47294d0b059fa8dc43fedd8480d6f72eb8357d01924dbe9cbebdaac1625c5f4f498392822

    • SSDEEP

      196608:1a4vbUQYRyS/Kh44vTM1NExeka13ZlfNf5PWwShXBFPHIG1MZBwYFCnvkC2:7vDX0gZvT2U/S3ZllEhxFPIG1rYFC8C

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks