Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Exela.exe

  • Size

    10.3MB

  • Sample

    250323-2xcgpssrv2

  • MD5

    332c96b140d4f825f406447b5dda9bc3

  • SHA1

    f6d95f6de9aec6503b2d0b68a2a8d48dc0999e34

  • SHA256

    d5fa15c436edd8dccd185ff2716b47e5a3b664c8afe6334297714a8598fa59a2

  • SHA512

    3f534b02afcb3004e3370d7a36aae572caaf7582f3808bc0f96b8ded9c46a4e1b8d9d02858c28cee8d0b0fdc818b1338e307d210981de6d53a6eec1dd99eb590

  • SSDEEP

    196608:e0BFaxU+7qnknqkPYC5RHvUWvo2hxjno/w3iFCxHQbRNSEtXRtF3pG1Jg+t:TKMSf5RHdJxro/w3uCxHQbqgtFs1Jrt

Malware Config

Targets

    • Target

      Exela.exe

    • Size

      10.3MB

    • MD5

      332c96b140d4f825f406447b5dda9bc3

    • SHA1

      f6d95f6de9aec6503b2d0b68a2a8d48dc0999e34

    • SHA256

      d5fa15c436edd8dccd185ff2716b47e5a3b664c8afe6334297714a8598fa59a2

    • SHA512

      3f534b02afcb3004e3370d7a36aae572caaf7582f3808bc0f96b8ded9c46a4e1b8d9d02858c28cee8d0b0fdc818b1338e307d210981de6d53a6eec1dd99eb590

    • SSDEEP

      196608:e0BFaxU+7qnknqkPYC5RHvUWvo2hxjno/w3iFCxHQbRNSEtXRtF3pG1Jg+t:TKMSf5RHdJxro/w3uCxHQbqgtFs1Jrt

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      Stub.pyc

    • Size

      799KB

    • MD5

      438e8ac276357882c1431e30fcbffac2

    • SHA1

      672b134aa366e34baf440af059e83bfa4896594b

    • SHA256

      252e934b19ff02b1cae6d9af30184d88f5aed810ee7685c878023b0243cd3d3c

    • SHA512

      6e3c1328da4e43cec4d2d4321f83d712c2715e752d747a11a2c081b7641609ad96a50ecb429dc1fae94e9b2718ea909bb80f2971b5e7ef45b14c81f33b5e3839

    • SSDEEP

      12288:X/n7lOpA+IBcck47km7YevozA+UxxFcA/fA3Oo5fvAC1+61taVvXLzt/n6zH79KQ:X/7lOp3IyclgzczXAeIDtaVcw1l4paB+

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks