General

  • Target

    bcdd8b7c9ec736765d4596332c0fec1334b035d4456df1ec25b569f9b6431a23.exe

  • Size

    10.7MB

  • Sample

    241219-eefp3sxmgn

  • MD5

    6898eace70e2da82f257bc78cb081b2f

  • SHA1

    5ac5ed21436d8b4c59c0b62836d531844c571d6d

  • SHA256

    bcdd8b7c9ec736765d4596332c0fec1334b035d4456df1ec25b569f9b6431a23

  • SHA512

    ca719707417a095fe092837e870aefc7e8874ef351e27b5b41e40f46a9e2f6cb2ba915858bc3c99a14c2f1288c71c7ddd9c2adee6588d6b43cd3ba276e1585d2

  • SSDEEP

    196608:EXJw5XZ54Gu3tLvKixbJ5qtWwgbBnNUm1ae30eL3h8g3SGXm4iF+gPa:Gy3RCBKixdoYwgNNp1IeSQSGWpFj

Malware Config

Targets

    • Target

      bcdd8b7c9ec736765d4596332c0fec1334b035d4456df1ec25b569f9b6431a23.exe

    • Size

      10.7MB

    • MD5

      6898eace70e2da82f257bc78cb081b2f

    • SHA1

      5ac5ed21436d8b4c59c0b62836d531844c571d6d

    • SHA256

      bcdd8b7c9ec736765d4596332c0fec1334b035d4456df1ec25b569f9b6431a23

    • SHA512

      ca719707417a095fe092837e870aefc7e8874ef351e27b5b41e40f46a9e2f6cb2ba915858bc3c99a14c2f1288c71c7ddd9c2adee6588d6b43cd3ba276e1585d2

    • SSDEEP

      196608:EXJw5XZ54Gu3tLvKixbJ5qtWwgbBnNUm1ae30eL3h8g3SGXm4iF+gPa:Gy3RCBKixdoYwgNNp1IeSQSGWpFj

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks