Resubmissions

30-11-2023 16:35

231130-t3zkesdh53 10

30-11-2023 16:31

231130-t1pbnsea4y 10

General

  • Target

    Oxlo.exe

  • Size

    13.2MB

  • Sample

    231130-t3zkesdh53

  • MD5

    e01c259ea4e8e6f35479d26e40cf1a75

  • SHA1

    361aa68bc5e5055a06e4d3689b8ba0612a595614

  • SHA256

    4e5c5be9b02a4b49b74de6420c0f91d0e860b4bd9327fcd8f13dfff880dc25a7

  • SHA512

    220e99ad2987c2f6c3ec2aab8c40656010bf40095ddd08457a2a87f1e6521a62cc2cd082ea89c1520eb40b0a498d4569823a04622920a82bb702d839539ffdaf

  • SSDEEP

    393216:biIE7Yo9+4uOwKnwW+eGQRJ9jo7BGcGnaJKt/WorLu:I7r9+RONwW+e5RJ9MyprLu

Malware Config

Targets

    • Target

      Oxlo.exe

    • Size

      13.2MB

    • MD5

      e01c259ea4e8e6f35479d26e40cf1a75

    • SHA1

      361aa68bc5e5055a06e4d3689b8ba0612a595614

    • SHA256

      4e5c5be9b02a4b49b74de6420c0f91d0e860b4bd9327fcd8f13dfff880dc25a7

    • SHA512

      220e99ad2987c2f6c3ec2aab8c40656010bf40095ddd08457a2a87f1e6521a62cc2cd082ea89c1520eb40b0a498d4569823a04622920a82bb702d839539ffdaf

    • SSDEEP

      393216:biIE7Yo9+4uOwKnwW+eGQRJ9jo7BGcGnaJKt/WorLu:I7r9+RONwW+e5RJ9MyprLu

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Sets file execution options in registry

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      Creal.pyc

    • Size

      123KB

    • MD5

      cc6f40f1309db1f4ee83f6ca93e4a766

    • SHA1

      5f6e84d5a4e11acbfbe5b2910c2ebe43377d84f2

    • SHA256

      29efe2700746c55e08fa852759d6b940b512bfe6c802b8aa4b14ab3ceb867fbf

    • SHA512

      ce63dfc7fcd44087fff5397aa34a190137a76286fa3180af8ef346da01b71eb9fd3e4f5404e75f68f8530d4bff762ea9398574a5a542a06f688cb01feca98d90

    • SSDEEP

      1536:FruaqMamgphoWdUeOPZZ4GQmGwWa2JJB9DsjvrRRB1OU01O8rHwr/lsjiK0XQARq:FK7MaNdU8dxZQTRRJ0YkQrdzRsjea

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks