General

  • Target

    Updater.zip

  • Size

    10.7MB

  • Sample

    240703-qx27ksyhme

  • MD5

    26827c9792689b74098834a6d8c20aab

  • SHA1

    07e2be92ae5393afcd690fb822130535a6d2c17e

  • SHA256

    482c560821dff63e878f6a8adf9e900a4e3756bd392ff92d37c135bd62e47de1

  • SHA512

    90941280d2260fca8fb5c16b49819dd10d1940936cc5e48bb0b4a1bb0ff692670c85905bb1dee9f44cedd6577df26fc339ce5703eab3c4a4a43c3c00e0483a30

  • SSDEEP

    196608:+ELj55Zei3SoDqxe6j5Wx2XfTmXRroRyc5LmeHH7+O7US1IxwH1/:rdui3FDqNj5FXfyhkRbKeHH7+4pICHx

Malware Config

Targets

    • Target

      Updater.zip

    • Size

      10.7MB

    • MD5

      26827c9792689b74098834a6d8c20aab

    • SHA1

      07e2be92ae5393afcd690fb822130535a6d2c17e

    • SHA256

      482c560821dff63e878f6a8adf9e900a4e3756bd392ff92d37c135bd62e47de1

    • SHA512

      90941280d2260fca8fb5c16b49819dd10d1940936cc5e48bb0b4a1bb0ff692670c85905bb1dee9f44cedd6577df26fc339ce5703eab3c4a4a43c3c00e0483a30

    • SSDEEP

      196608:+ELj55Zei3SoDqxe6j5Wx2XfTmXRroRyc5LmeHH7+O7US1IxwH1/:rdui3FDqNj5FXfyhkRbKeHH7+4pICHx

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Deletes itself

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

Persistence

Account Manipulation

1
T1098

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Event Triggered Execution

1
T1546

Netsh Helper DLL

1
T1546.007

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Hide Artifacts

2
T1564

Hidden Files and Directories

2
T1564.001

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

6
T1082

Process Discovery

1
T1057

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks