MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d4ca985b2ebe90f86ef01918939e097050613b28f2bcca3bdf680c5c812105f0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ExelaStealer


Vendor detections: 8


Intelligence 8 IOCs YARA 4 File information Comments

SHA256 hash: d4ca985b2ebe90f86ef01918939e097050613b28f2bcca3bdf680c5c812105f0
SHA3-384 hash: 6ce9fc02ef8c8a475218998389bb54a389c19798e40ef64d51bcab75afdac0fa7799d81dc2731077c9b0886854334769
SHA1 hash: 48cb9215a71c354277d5b9b35dc236d6ee6c1169
MD5 hash: fae690f9aa9d065d03d239e8e639f7a0
humanhash: charlie-venus-nitrogen-potato
File name:2cy9wa.ps1
Download: download sample
Signature ExelaStealer
File size:9'573 bytes
First seen:2025-07-23 11:04:53 UTC
Last seen:Never
File type:PowerShell (PS) ps1
MIME type:text/plain
ssdeep 192:tov28e0rvkRRUPsijar1rZScv49nHrAzj1VVTlGSuy/:MJvkRRUPsijaVZScv49nLihVVTlGSuA
TLSH T1351264216974D7B14AF31E52F8E3EC95C9365163189A5800B6FDC7A21F3E458C5F222F
Magika powershell
Reporter abuse_ch
Tags:ExelaStealer ps1

Intelligence


File Origin
# of uploads :
1
# of downloads :
50
Origin country :
SE SE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
97.4%
Tags:
obfuscate xtreme sage
Result
Threat name:
Python Stealer, Infinity Stealer
Detection:
malicious
Classification:
rans.spre.phis.troj.spyw.expl.evad
Score:
100 / 100
Signature
Bypasses PowerShell execution policy
Detected generic credential text file
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Found pyInstaller with non standard icon
Found suspicious powershell code related to unpacking or dynamic code loading
Gathers network related connection and port information
Joe Sandbox ML detected suspicious sample
Modifies existing user documents (likely ransomware behavior)
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Overwrites the password of the administrator account
Performs a network lookup / discovery via ARP
Powershell drops PE file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive service information (via WMI, Win32_StartupCommand, often done to detect sandboxes)
Sigma detected: Capture Wi-Fi password
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Uses attrib.exe to hide files
Uses ipconfig to lookup or modify the Windows network settings
Uses netsh to modify the Windows network and firewall settings
Uses netstat to query active network connections and open ports
Yara detected Generic Python Stealer
Yara detected Infinity Stealer
Yara detected Powershell download and execute
Yara detected Python Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1742641 Sample: 2cy9wa.ps1 Startdate: 23/07/2025 Architecture: WINDOWS Score: 100 100 store1.gofile.io 2->100 102 raw.githubusercontent.com 2->102 104 4 other IPs or domains 2->104 124 Sigma detected: Capture Wi-Fi password 2->124 126 Multi AV Scanner detection for dropped file 2->126 128 Yara detected Infinity Stealer 2->128 130 7 other signatures 2->130 12 powershell.exe 15 22 2->12         started        signatures3 process4 dnsIp5 112 github.com 140.82.114.3, 443, 49691 GITHUBUS United States 12->112 114 raw.githubusercontent.com 185.199.109.133, 443, 49692 FASTLYUS Netherlands 12->114 94 C:\Users\user\AppData\Local\Temp\Dekont.exe, PE32+ 12->94 dropped 164 Found many strings related to Crypto-Wallets (likely being stolen) 12->164 166 Found suspicious powershell code related to unpacking or dynamic code loading 12->166 168 Powershell drops PE file 12->168 17 Dekont.exe 61 12->17         started        21 conhost.exe 12->21         started        file6 signatures7 process8 file9 78 C:\Users\...\_quoting_c.cp311-win_amd64.pyd, PE32+ 17->78 dropped 80 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 17->80 dropped 82 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+ 17->82 dropped 84 30 other malicious files 17->84 dropped 116 Multi AV Scanner detection for dropped file 17->116 118 Modifies the windows firewall 17->118 120 Tries to harvest and steal WLAN passwords 17->120 122 2 other signatures 17->122 23 Dekont.exe 107 17->23         started        signatures10 process11 dnsIp12 106 ip-api.com 208.95.112.1, 49701, 80 TUT-ASUS United States 23->106 108 api.gofile.io 160.202.167.55, 443, 49712 DEDICATEDUS New Zealand 23->108 110 3 other IPs or domains 23->110 86 C:\Users\user\AppData\Local\...\Infinity.exe, PE32+ 23->86 dropped 88 C:\Users\user\AppData\...\places.sqlite-shm, data 23->88 dropped 90 C:\Users\user\AppData\...\cookies.sqlite-shm, data 23->90 dropped 92 8 other malicious files 23->92 dropped 140 Found many strings related to Crypto-Wallets (likely being stolen) 23->140 142 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 23->142 144 Tries to harvest and steal browser information (history, passwords, etc) 23->144 146 4 other signatures 23->146 28 cmd.exe 1 23->28         started        31 cmd.exe 23->31         started        33 cmd.exe 23->33         started        35 11 other processes 23->35 file13 signatures14 process15 signatures16 148 Encrypted powershell cmdline option found 28->148 150 Bypasses PowerShell execution policy 28->150 152 Uses netstat to query active network connections and open ports 28->152 162 3 other signatures 28->162 37 conhost.exe 28->37         started        154 Overwrites the password of the administrator account 31->154 156 Gathers network related connection and port information 31->156 158 Performs a network lookup / discovery via ARP 31->158 39 systeminfo.exe 31->39         started        42 net.exe 31->42         started        44 net.exe 31->44         started        53 16 other processes 31->53 46 powershell.exe 33->46         started        49 conhost.exe 33->49         started        160 Tries to harvest and steal WLAN passwords 35->160 51 WMIC.exe 1 35->51         started        55 21 other processes 35->55 process17 file18 132 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 39->132 57 WmiPrvSE.exe 39->57         started        134 Overwrites the password of the administrator account 42->134 59 net1.exe 42->59         started        61 net1.exe 44->61         started        96 C:\Users\user\AppData\...\ufm3qq5b.cmdline, Unicode 46->96 dropped 63 csc.exe 46->63         started        136 Queries sensitive service information (via WMI, Win32_StartupCommand, often done to detect sandboxes) 51->136 138 Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes) 51->138 66 quser.exe 53->66         started        68 net1.exe 53->68         started        74 2 other processes 53->74 70 chcp.com 55->70         started        72 chcp.com 55->72         started        signatures19 process20 file21 98 C:\Users\user\AppData\Local\...\ufm3qq5b.dll, PE32 63->98 dropped 76 cvtres.exe 63->76         started        process22
Gathering data
Threat name:
Script-PowerShell.Downloader.ExelaStealer
Status:
Malicious
First seen:
2025-07-23 01:07:29 UTC
File Type:
Text (PowerShell)
AV detection:
8 of 24 (33.33%)
Threat level:
  3/5
Result
Malware family:
exelastealer
Score:
  10/10
Tags:
family:exelastealer collection credential_access defense_evasion discovery execution persistence privilege_escalation pyinstaller spyware stealer upx
Behaviour
Collects information from the system
Gathers network information
Gathers system information
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Browser Information Discovery
Command and Scripting Interpreter: PowerShell
Detects Pyinstaller
Event Triggered Execution: Netsh Helper DLL
Permission Groups Discovery: Local Groups
System Network Configuration Discovery: Wi-Fi Discovery
System Network Connections Discovery
Launches sc.exe
Enumerates processes with tasklist
Hide Artifacts: Hidden Files and Directories
UPX packed file
Accesses cryptocurrency files/wallets, possible credential harvesting
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Network Service Discovery
Obfuscated Files or Information: Command Obfuscation
Clipboard Data
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
Unsecured Credentials: Credentials In Files
Blocklisted process makes network request
Downloads MZ/PE file
Modifies Windows Firewall
Grants admin privileges
Exela Stealer
Exelastealer family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:detect_powershell
Author:daniyyell
Description:Detects suspicious PowerShell activity related to malware execution
Rule name:Detect_PowerShell_Obfuscation
Author:daniyyell
Description:Detects obfuscated PowerShell commands commonly used in malicious scripts.
Rule name:Detect_Remcos_RAT
Author:daniyyell
Description:Detects Remcos RAT payloads and commands
Rule name:Sus_CMD_Powershell_Usage
Author:XiAnzheng
Description:May Contain(Obfuscated or no) Powershell or CMD Command that can be abused by threat actor(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ExelaStealer

PowerShell (PS) ps1 d4ca985b2ebe90f86ef01918939e097050613b28f2bcca3bdf680c5c812105f0

(this sample)

  
Delivery method
Distributed via web download

Comments