General

  • Target

    Exela.exe

  • Size

    15.6MB

  • Sample

    250109-jbee3atjc1

  • MD5

    5a84a9ee76be098534319736cad8400c

  • SHA1

    1d424de5141a8fb6da416276de5f2bb57a055817

  • SHA256

    0a42d65229b9b6ee83f3fd7828d13713e1edfff6cc5470059470e0bcbd00105d

  • SHA512

    61c3a0ed7a4838c6f4bd3c5ffec67509ffc4dacec4e4f0570d5dc6d6d9d45a70ac02d20ca7214ce557429dfb1fa97c277be2c9cb615207e09dc02b0f1f59eee7

  • SSDEEP

    393216:fPWdqLQ63huc8bjdQJlAwF3MnG3VlCOE0GePWR7pU/mHKNAH:38mR3hr8XdQ53MGOO5v+D

Malware Config

Targets

    • Target

      Exela.exe

    • Size

      15.6MB

    • MD5

      5a84a9ee76be098534319736cad8400c

    • SHA1

      1d424de5141a8fb6da416276de5f2bb57a055817

    • SHA256

      0a42d65229b9b6ee83f3fd7828d13713e1edfff6cc5470059470e0bcbd00105d

    • SHA512

      61c3a0ed7a4838c6f4bd3c5ffec67509ffc4dacec4e4f0570d5dc6d6d9d45a70ac02d20ca7214ce557429dfb1fa97c277be2c9cb615207e09dc02b0f1f59eee7

    • SSDEEP

      393216:fPWdqLQ63huc8bjdQJlAwF3MnG3VlCOE0GePWR7pU/mHKNAH:38mR3hr8XdQ53MGOO5v+D

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks