General
-
Target
fix solve.rar
-
Size
17.9MB
-
Sample
250219-p36lhs1lfw
-
MD5
e7200a9d41ccbc6117adc585d80a339b
-
SHA1
1a81172d0cbb33f3c304f4282a92e4bfe6e9329f
-
SHA256
02885f0df1df616298a4768a79af718894f63b0fa953f682eea823999ab2cc8d
-
SHA512
65a65550ad2711ed0d36f9c375aefe544ddba9c74a08439af1952a07ee02e34b98bccd10ab3c1c153d57baf3e88e499a3468ab8101dd71ae25b7af2eaaf02c22
-
SSDEEP
393216:NzRxZS3atZgob/Fx1Yt4fCia/LTM968jbhc4iQkLZ3+mUedksWtOlXCKaH1a/0:1R4uZdYaq//cEik7UKWydaH100
Behavioral task
behavioral1
Sample
MAPPING/HWID.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
MAPPING/HWID.dll
Resource
win11-20250217-en
Behavioral task
behavioral3
Sample
MAPPING/HWID.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral4
Sample
MAPPING/HWID.exe
Resource
win11-20250217-en
Behavioral task
behavioral5
Sample
fix solve.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
MAPPING/HWID.dll
-
Size
1.3MB
-
MD5
6a635fa58e5455397180eda307fb64ba
-
SHA1
0e83defcbafec8c15707e2e71947e77d960a3648
-
SHA256
bd6843726688bd7253a42180bf95671ad5b0f9e787adb4f13250f484abd9eae4
-
SHA512
00a318b1fdb38efef39351e291fd8db9bd096307a1b6319191cfcbef6d5b7e0486cb19968291f64d3d2fe48e062bbfdec9c2e185010848b7df87bead4eac2fbb
-
SSDEEP
24576:8HVrqyQ8I2dBY8rekRCw7qb+sOZaDKSiEEemqzipKB:8HVrqbuYw75ZOVviE
Score3/10 -
-
-
Target
MAPPING/HWID.exe
-
Size
10.8MB
-
MD5
40f6b1d4460a754b7205d373508290e4
-
SHA1
2b369c593bed26a48bdadb0e349123a97ecaefb1
-
SHA256
2b32692adabb4a79ca82fa1cb69f31070aa50455689eb2e621f771b013b75d7e
-
SHA512
701d257bdd16acb063a2917f04248a9924373d7b590319eda4acab21a963538845f7a8c5cb4c7343e85d12d5b9648ae75fbb6bc088ee6ff121545e047b131cd4
-
SSDEEP
196608:Z0PZEKAU3cj5TcivNm1E8giq1g9mveNo+wfm/pf+xfdkRKOAxKwCr2WOHWKD3beH:SZy/ci1m1Nqao+9/pWFGRw0br2W673KH
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
fix solve.exe
-
Size
6.9MB
-
MD5
64a99fc7ace0438546ef69c84d4b7e7a
-
SHA1
690bf1ba7abb0224f5c75faea9f08b014dd8150c
-
SHA256
fd6553bf4a56736ed59a43b0d2b1ec092ea9eaa9316facecb4203d55a50c99f9
-
SHA512
ab9c8dbe10f0c93b1dba5a7b0ec2d654b1ec712c9ff42b89ff7ca1221bada30129689777970f144f1a791e74f4e3c7708881af25bb4bd93ff377a82098394a1c
-
SSDEEP
196608:MWj0MMd5eNTfm/pf+xk4dWRimrbW3jmy+:w4y/pWu4kRimrbmyR
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1System Information Discovery
2System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1