MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ded95299f780dfbdbafd1be5d02792fcfe9023372551e1ac35401928699dd8e1. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



ExelaStealer


Vendor detections: 14


Intelligence 14 IOCs YARA 6 File information Comments

SHA256 hash: ded95299f780dfbdbafd1be5d02792fcfe9023372551e1ac35401928699dd8e1
SHA3-384 hash: 80a78d9d098c02dcf5e9bed68a53ecf7024caa6055890a39e7bcaa3feff0fbfe27fd1eaee883f34170361548e330f588
SHA1 hash: de21e8cd63f043243805af8b28a5414442f36329
MD5 hash: e5a2fee622dc433b5648e97a25737cb5
humanhash: tango-cardinal-fifteen-michigan
File name:Exter.exe
Download: download sample
Signature ExelaStealer
File size:22'245'472 bytes
First seen:2024-07-11 20:35:23 UTC
Last seen:2024-07-11 21:19:59 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 456e8615ad4320c9f54e50319a19df9c (15 x SVCStealer, 10 x BlankGrabber, 5 x CoinMiner)
ssdeep 196608:m1UwyPA4mtSHeNvX+wfm/pf+xfdkR0ZWKsnarIWOzW0DaqkH:qUKvtSUvX+9/pWFGRiBsnarIWeRaDH
TLSH T1F2273365A3900DE6ECB627F9C452C9759233BC940B70D64E02F979A7FEF32810C2BA55
TrID 70.8% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
12.9% (.EXE) Win64 Executable (generic) (10523/12/4)
6.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
2.5% (.ICL) Windows Icons Library (generic) (2059/9)
2.4% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 681271e8e8711248 (1 x ExelaStealer)
Reporter aachum
Tags:exe ExelaStealer


Avatar
iamaachum
https://github.com/2k6k/Exter-Roblox-Exploit-V0.1/raw/main/Exter.zip

Intelligence


File Origin
# of uploads :
2
# of downloads :
403
Origin country :
ES ES
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
https://github.com/2k6k/Exter-Roblox-Exploit-V0.1/raw/main/Exter.zip
Verdict:
Malicious activity
Analysis date:
2024-07-11 19:19:12 UTC
Tags:
exela stealer evasion discord python

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the %temp% subdirectories
Restart of the analyzed sample
Running batch commands
Creating a process with a hidden window
Сreating synchronization primitives
Connection attempt
Creating a file
Launching a process
Using the Windows Management Instrumentation requests
Searching for synchronization primitives
Enabling the 'hidden' option for recently created files
Creating a window
Changing a file
Reading critical registry keys
Forced system process termination
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Launching the process to change network settings
Launching the process to interact with network services
Enabling autorun with the standard Software\Microsoft\Windows\CurrentVersion\Run registry branch
Launching a tool to kill processes
Forced shutdown of a browser
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
expand lolbin microsoft_visual_cc overlay
Result
Verdict:
MALICIOUS
Result
Threat name:
Exela Stealer, Python Stealer
Detection:
malicious
Classification:
rans.spre.phis.troj.spyw.evad
Score:
100 / 100
Signature
AI detected suspicious sample
Detected generic credential text file
Found many strings related to Crypto-Wallets (likely being stolen)
Found pyInstaller with non standard icon
Gathers network related connection and port information
Modifies existing user documents (likely ransomware behavior)
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites the password of the administrator account
Performs a network lookup / discovery via ARP
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Queries sensitive service information (via WMI, Win32_StartupCommand, often done to detect sandboxes)
Sigma detected: Add file from suspicious location to autostart registry
Sigma detected: Capture Wi-Fi password
Sigma detected: MSHTA Suspicious Execution 01
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal WLAN passwords
Tries to steal Crypto Currency Wallets
Uses attrib.exe to hide files
Uses ipconfig to lookup or modify the Windows network settings
Uses netsh to modify the Windows network and firewall settings
Uses netstat to query active network connections and open ports
Yara detected Exela Stealer
Yara detected Generic Downloader
Yara detected Python Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1471836 Sample: Exter.exe Startdate: 11/07/2024 Architecture: WINDOWS Score: 100 89 store1.gofile.io 2->89 91 ip-api.com 2->91 93 2 other IPs or domains 2->93 103 Sigma detected: Capture Wi-Fi password 2->103 105 Multi AV Scanner detection for dropped file 2->105 107 Multi AV Scanner detection for submitted file 2->107 109 6 other signatures 2->109 10 Exter.exe 58 2->10         started        14 svchost.exe 2->14         started        signatures3 process4 file5 75 C:\Users\...\_quoting_c.cp311-win_amd64.pyd, PE32+ 10->75 dropped 77 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 10->77 dropped 79 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+ 10->79 dropped 81 29 other malicious files 10->81 dropped 127 Modifies the windows firewall 10->127 129 Tries to harvest and steal WLAN passwords 10->129 131 Found pyInstaller with non standard icon 10->131 133 Gathers network related connection and port information 10->133 16 Exter.exe 134 10->16         started        signatures6 process7 dnsIp8 83 ip-api.com 208.95.112.1, 49740, 80 TUT-ASUS United States 16->83 85 api.gofile.io 51.38.43.18, 443, 49759 OVHFR France 16->85 87 4 other IPs or domains 16->87 67 C:\Users\user\AppData\Local\...xela.exe, PE32+ 16->67 dropped 69 C:\Users\user\AppData\...\VLZDGUKUTZ.pdf, ASCII 16->69 dropped 71 C:\Users\user\AppData\...\UMMBDNEQBN.docx, ASCII 16->71 dropped 73 8 other malicious files 16->73 dropped 95 Found many strings related to Crypto-Wallets (likely being stolen) 16->95 97 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 16->97 99 Tries to harvest and steal browser information (history, passwords, etc) 16->99 101 5 other signatures 16->101 21 cmd.exe 1 16->21         started        24 cmd.exe 16->24         started        26 cmd.exe 1 16->26         started        28 15 other processes 16->28 file9 signatures10 process11 signatures12 111 Uses netstat to query active network connections and open ports 21->111 113 Uses netsh to modify the Windows network and firewall settings 21->113 115 Uses ipconfig to lookup or modify the Windows network settings 21->115 117 Uses attrib.exe to hide files 21->117 30 conhost.exe 21->30         started        119 Overwrites the password of the administrator account 24->119 121 Gathers network related connection and port information 24->121 123 Performs a network lookup / discovery via ARP 24->123 33 systeminfo.exe 24->33         started        35 net.exe 24->35         started        37 net.exe 24->37         started        45 16 other processes 24->45 39 WMIC.exe 1 26->39         started        41 conhost.exe 26->41         started        125 Tries to harvest and steal WLAN passwords 28->125 43 cmd.exe 28->43         started        47 28 other processes 28->47 process13 signatures14 135 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 33->135 49 WmiPrvSE.exe 33->49         started        137 Overwrites the password of the administrator account 35->137 51 net1.exe 35->51         started        53 net1.exe 37->53         started        139 Queries sensitive service information (via WMI, Win32_StartupCommand, often done to detect sandboxes) 39->139 141 Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes) 39->141 55 chcp.com 43->55         started        57 quser.exe 45->57         started        59 net1.exe 45->59         started        61 net1.exe 45->61         started        63 net1.exe 45->63         started        65 chcp.com 47->65         started        process15
Gathering data
Threat name:
Win64.Trojan.CrypterX
Status:
Malicious
First seen:
2024-07-11 20:36:13 UTC
File Type:
PE+ (Exe)
Extracted files:
19
AV detection:
8 of 24 (33.33%)
Threat level:
  5/5
Verdict:
unknown
Result
Malware family:
exelastealer
Score:
  10/10
Tags:
family:exelastealer defense_evasion evasion persistence privilege_escalation pyinstaller spyware stealer upx
Behaviour
Collects information from the system
Detects videocard installed
Enumerates processes with tasklist
Gathers network information
Gathers system information
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Views/modifies file attributes
Detects Pyinstaller
Event Triggered Execution: Netsh Helper DLL
Launches sc.exe
Hide Artifacts: Hidden Files and Directories
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Loads dropped DLL
Reads user/profile data of web browsers
UPX packed file
Modifies Windows Firewall
Grants admin privileges
Exela Stealer
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:PyInstaller
Author:@bartblaze
Description:Identifies executable converted using PyInstaller.
Rule name:PyInstaller_Packed_April_2024
Author:NDA0N
Description:Detects files packed with PyInstaller

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

ExelaStealer

Executable exe ded95299f780dfbdbafd1be5d02792fcfe9023372551e1ac35401928699dd8e1

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (FORCE_INTEGRITY)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::ConvertSidToStringSidW
ADVAPI32.dll::ConvertStringSecurityDescriptorToSecurityDescriptorW
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::GetTokenInformation
WIN32_PROCESS_APICan Create Process and ThreadsKERNEL32.dll::CreateProcessW
ADVAPI32.dll::OpenProcessToken
KERNEL32.dll::CloseHandle
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::GetDriveTypeW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineW
KERNEL32.dll::GetCommandLineA
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetConsoleCtrlHandler
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleMode
KERNEL32.dll::GetConsoleOutputCP
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
KERNEL32.dll::FindFirstFileW
KERNEL32.dll::RemoveDirectoryW
KERNEL32.dll::SetDllDirectoryW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::CreateWindowExW

Comments