General

  • Target

    loader.exe

  • Size

    43.8MB

  • Sample

    250119-ybxzqstjap

  • MD5

    b24f88f0db403ac11a78716ff320deb4

  • SHA1

    9c8d20371469ea36e3587b7ab63f523b8bfd4648

  • SHA256

    2fc809e60498653ef870494366d1d633eed8244332f6bdb14aefaeef1032db44

  • SHA512

    7ca0790b1413d55e623157de8cdd7542d1cd78bd0464cf71c66f617a4332dbf6bb9e8cc2ac01cd70cbd342e995504f96dac38368a17979ce256a0b4724725c06

  • SSDEEP

    786432:7CqTaQlonjFuR8OluTIzSiJPDY5IISZhDaTxgJa+bwsHbGG5oD/4Gd3Ax9cMGH:GqTa9Y8OmIzSmPDKCDalsHbGbhd3ScM4

Malware Config

Targets

    • Target

      loader.exe

    • Size

      43.8MB

    • MD5

      b24f88f0db403ac11a78716ff320deb4

    • SHA1

      9c8d20371469ea36e3587b7ab63f523b8bfd4648

    • SHA256

      2fc809e60498653ef870494366d1d633eed8244332f6bdb14aefaeef1032db44

    • SHA512

      7ca0790b1413d55e623157de8cdd7542d1cd78bd0464cf71c66f617a4332dbf6bb9e8cc2ac01cd70cbd342e995504f96dac38368a17979ce256a0b4724725c06

    • SSDEEP

      786432:7CqTaQlonjFuR8OluTIzSiJPDY5IISZhDaTxgJa+bwsHbGG5oD/4Gd3Ax9cMGH:GqTa9Y8OmIzSmPDKCDalsHbGbhd3ScM4

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks