General

  • Target

    Xkone v4.exe

  • Size

    15.9MB

  • Sample

    240906-tfp3gaware

  • MD5

    01b4ca2796331cef6e6996371357d6d7

  • SHA1

    ea452b1074b8e18fe540366f607416282c821109

  • SHA256

    fd5b4edb8a40da68d03d999d3cbbf1fb070c8ba8edb1626d41065972d3733418

  • SHA512

    8fc97406aa3eda7695754b4305df9984f1611eda7d2c7871f6869b560735f4fa0886243feb7ac9681732c84f6ca642e50381573f3b4ca670929420d2a84103e8

  • SSDEEP

    393216:i4MeNpFqOa9hO3F9MjUIpa+i3UVqurEUWjC3zDAa04Ak:i4pNmFEF9MjUII+GdbCYH4Ak

Malware Config

Targets

    • Target

      Xkone v4.exe

    • Size

      15.9MB

    • MD5

      01b4ca2796331cef6e6996371357d6d7

    • SHA1

      ea452b1074b8e18fe540366f607416282c821109

    • SHA256

      fd5b4edb8a40da68d03d999d3cbbf1fb070c8ba8edb1626d41065972d3733418

    • SHA512

      8fc97406aa3eda7695754b4305df9984f1611eda7d2c7871f6869b560735f4fa0886243feb7ac9681732c84f6ca642e50381573f3b4ca670929420d2a84103e8

    • SSDEEP

      393216:i4MeNpFqOa9hO3F9MjUIpa+i3UVqurEUWjC3zDAa04Ak:i4pNmFEF9MjUII+GdbCYH4Ak

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks