General

  • Target

    Oxlo.exe

  • Size

    13.2MB

  • Sample

    231120-qzw4cahb6y

  • MD5

    e01c259ea4e8e6f35479d26e40cf1a75

  • SHA1

    361aa68bc5e5055a06e4d3689b8ba0612a595614

  • SHA256

    4e5c5be9b02a4b49b74de6420c0f91d0e860b4bd9327fcd8f13dfff880dc25a7

  • SHA512

    220e99ad2987c2f6c3ec2aab8c40656010bf40095ddd08457a2a87f1e6521a62cc2cd082ea89c1520eb40b0a498d4569823a04622920a82bb702d839539ffdaf

  • SSDEEP

    393216:biIE7Yo9+4uOwKnwW+eGQRJ9jo7BGcGnaJKt/WorLu:I7r9+RONwW+e5RJ9MyprLu

Malware Config

Targets

    • Target

      Oxlo.exe

    • Size

      13.2MB

    • MD5

      e01c259ea4e8e6f35479d26e40cf1a75

    • SHA1

      361aa68bc5e5055a06e4d3689b8ba0612a595614

    • SHA256

      4e5c5be9b02a4b49b74de6420c0f91d0e860b4bd9327fcd8f13dfff880dc25a7

    • SHA512

      220e99ad2987c2f6c3ec2aab8c40656010bf40095ddd08457a2a87f1e6521a62cc2cd082ea89c1520eb40b0a498d4569823a04622920a82bb702d839539ffdaf

    • SSDEEP

      393216:biIE7Yo9+4uOwKnwW+eGQRJ9jo7BGcGnaJKt/WorLu:I7r9+RONwW+e5RJ9MyprLu

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks