General

  • Target

    Hellion.exe

  • Size

    38.7MB

  • Sample

    250413-vrzlqa1shx

  • MD5

    3d5d0bcd081c20d4c6ab7bfaec4b1125

  • SHA1

    d74f8ba6bdc5535b664970be7d43eb5ea0c68f2a

  • SHA256

    a954b634c1cb0f7622ea2e35b2e609ef19e70f098845de07eb2156d7cd2945f6

  • SHA512

    1ac7aa9fba626ed34bfa2b1a3d64be550c97f50f160bd83b73d424acb8c40ec54157fe3fe55b4ed7e80cc0ff0e3b766b8abe0261fc0e59f3cffe47274dd7f297

  • SSDEEP

    786432:7NpCOk80jAvi/pl4AT5bJ1phu3QLOZBPNnq0dD81G6KTYlaCadHtyQgrzFtUt5:7NpDkJAvi/z4AZ3vrLOZf1dDsnKya5CM

Malware Config

Targets

    • Target

      Hellion.exe

    • Size

      38.7MB

    • MD5

      3d5d0bcd081c20d4c6ab7bfaec4b1125

    • SHA1

      d74f8ba6bdc5535b664970be7d43eb5ea0c68f2a

    • SHA256

      a954b634c1cb0f7622ea2e35b2e609ef19e70f098845de07eb2156d7cd2945f6

    • SHA512

      1ac7aa9fba626ed34bfa2b1a3d64be550c97f50f160bd83b73d424acb8c40ec54157fe3fe55b4ed7e80cc0ff0e3b766b8abe0261fc0e59f3cffe47274dd7f297

    • SSDEEP

      786432:7NpCOk80jAvi/pl4AT5bJ1phu3QLOZBPNnq0dD81G6KTYlaCadHtyQgrzFtUt5:7NpDkJAvi/z4AZ3vrLOZf1dDsnKya5CM

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v16

Tasks