General
-
Target
FN Priv.exe
-
Size
11.8MB
-
Sample
250223-fpvgnaxqfj
-
MD5
6ad85e751e4faa0738bed9a105d92dc0
-
SHA1
20346861c1097e4174e86cdd04106c6fdaeb87f7
-
SHA256
e3a9f01d1244f95e1db32eff99541d81e76b60655ebcd1af30fc3bf4280f421e
-
SHA512
4f03a2980afcaae9d50086c3f3cfab006318d183ed1e93f499ec6bb12c760701257b8e390c8e746306582739534ef4484646bc2f2371ca9eb941a5d2c7e88052
-
SSDEEP
196608:n0a49EKAUB9R6yDknqkPYeveN4+wfm/pf+xfdjSEqRKOAxKwPr2WOHWKD3ueH:vgyq9R6yDSM4+9/pWF8NRw0qr2W673BH
Behavioral task
behavioral1
Sample
FN Priv.exe
Resource
win10ltsc2021-20250218-en
Behavioral task
behavioral2
Sample
Stub.pyc
Resource
win10ltsc2021-20250217-en
Malware Config
Targets
-
-
Target
FN Priv.exe
-
Size
11.8MB
-
MD5
6ad85e751e4faa0738bed9a105d92dc0
-
SHA1
20346861c1097e4174e86cdd04106c6fdaeb87f7
-
SHA256
e3a9f01d1244f95e1db32eff99541d81e76b60655ebcd1af30fc3bf4280f421e
-
SHA512
4f03a2980afcaae9d50086c3f3cfab006318d183ed1e93f499ec6bb12c760701257b8e390c8e746306582739534ef4484646bc2f2371ca9eb941a5d2c7e88052
-
SSDEEP
196608:n0a49EKAUB9R6yDknqkPYeveN4+wfm/pf+xfdjSEqRKOAxKwPr2WOHWKD3ueH:vgyq9R6yDSM4+9/pWF8NRw0qr2W673BH
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Stub.pyc
-
Size
874KB
-
MD5
ed2c1eb50ead9d0e90a2ce9ef1620afa
-
SHA1
65191230f8b48fbc49a6899c565fa4ddb1a49835
-
SHA256
6980f4295121f9165bba3ce7b7e3b39eee3d283bbfd2d4c8c764337e09b5f270
-
SHA512
f56133e5d4195ddb4d8d56b34ba7dfc978044260ba7e94e994f1e55645befd0d7a4fcf0276542e8624ce631fd62b22aeb1e4b777f064d41c54feb10cc65f4a93
-
SSDEEP
12288:Ugy6enDv0lBfmvj9KQP2VAkH9va9DfKfN89lsNjb/jfcFdMe24KEa:UgylUE9P2lH1OrENjvfcPKEa
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1System Information Discovery
4System Network Configuration Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1