General
-
Target
loader_fixed.exe
-
Size
7.0MB
-
Sample
240703-qvfwkayerg
-
MD5
f65f70a4714cc9fe3e8d3f422059d01a
-
SHA1
6c499688317d35aabd75e7437934764127a49fcd
-
SHA256
824beea90d19363d695abcb8f8a89bfcd6a07c49e9d477de5db9090c1b368eba
-
SHA512
0bbe3f63b494707b6feca848fb0eed9c1d33275efa7d236ed9086e837f475ae5f90bcc6919f5484ab1b6eb4388a6958362cee1b14f44ee75040968572ddb5677
-
SSDEEP
196608:g5ieOqO57FgYAXfylY2Szpm+Ceww+OUQaU+E3wIHzA:ChM7FgYz6nzpZCnaUQhPP
Static task
static1
Behavioral task
behavioral1
Sample
loader_fixed.exe
Resource
win11-20240508-en
Malware Config
Extracted
xenorat
37.120.141.155
SteamUDP_FULL
-
delay
5000
-
install_path
temp
-
port
22914
-
startup_name
SteamUDPUpdater
Targets
-
-
Target
loader_fixed.exe
-
Size
7.0MB
-
MD5
f65f70a4714cc9fe3e8d3f422059d01a
-
SHA1
6c499688317d35aabd75e7437934764127a49fcd
-
SHA256
824beea90d19363d695abcb8f8a89bfcd6a07c49e9d477de5db9090c1b368eba
-
SHA512
0bbe3f63b494707b6feca848fb0eed9c1d33275efa7d236ed9086e837f475ae5f90bcc6919f5484ab1b6eb4388a6958362cee1b14f44ee75040968572ddb5677
-
SSDEEP
196608:g5ieOqO57FgYAXfylY2Szpm+Ceww+OUQaU+E3wIHzA:ChM7FgYz6nzpZCnaUQhPP
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1