General

  • Target

    Exela.exe

  • Size

    10.8MB

  • Sample

    250104-vtzz9sypbt

  • MD5

    e7fd60de12a8c5e3cd1bed1fe7d12ed8

  • SHA1

    81d2b90d34ebb83ff09e84a83cdd90af7cf2065a

  • SHA256

    bdc49cd46f6b0b923594558d4a72141384f42a0d242602e6928b527f8df5e519

  • SHA512

    b0a0589c5b1e38e90822f2e524a16445fe98f99e2ba914ab94e1aa9f838415e2d5455611798118cc3710d8e1807a9ca0509934d381c3921f180789842dd89893

  • SSDEEP

    196608:tIGKApx3ivNm1E8giq1g9mveNo+wfm/pf+xfdkR6HAxKwCr2WOHWKD3beH:Ln3i1m1Nqao+9/pWFGRZ0br2W673KH

Malware Config

Targets

    • Target

      Exela.exe

    • Size

      10.8MB

    • MD5

      e7fd60de12a8c5e3cd1bed1fe7d12ed8

    • SHA1

      81d2b90d34ebb83ff09e84a83cdd90af7cf2065a

    • SHA256

      bdc49cd46f6b0b923594558d4a72141384f42a0d242602e6928b527f8df5e519

    • SHA512

      b0a0589c5b1e38e90822f2e524a16445fe98f99e2ba914ab94e1aa9f838415e2d5455611798118cc3710d8e1807a9ca0509934d381c3921f180789842dd89893

    • SSDEEP

      196608:tIGKApx3ivNm1E8giq1g9mveNo+wfm/pf+xfdkR6HAxKwCr2WOHWKD3beH:Ln3i1m1Nqao+9/pWFGRZ0br2W673KH

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks