General

  • Target

    Xen Logger.exe

  • Size

    17.8MB

  • Sample

    240908-2r5w3ayhqm

  • MD5

    74881daaf37f7523b0b9b010355e46a1

  • SHA1

    f47d46ca6b1eaaebe7c34a05573d6578e9a21f03

  • SHA256

    6fc3f9522db427cd1803e2f91915822c52e369234ad61388fc4fd3f63b6956f6

  • SHA512

    1774c57093749f3f2e6b691a5f6fe94d4bc088c11f5422a581b8d1f59f213d6305188598bef954dbc5732cef079787cd59fd93f92185f879845b4f5cb415d09e

  • SSDEEP

    393216:eqPnLFXlreQ8DOETgsvfG0v9gGxxvEohGoaktq:TPLFXNeQhEbVD0loy

Malware Config

Targets

    • Target

      Xen Logger.exe

    • Size

      17.8MB

    • MD5

      74881daaf37f7523b0b9b010355e46a1

    • SHA1

      f47d46ca6b1eaaebe7c34a05573d6578e9a21f03

    • SHA256

      6fc3f9522db427cd1803e2f91915822c52e369234ad61388fc4fd3f63b6956f6

    • SHA512

      1774c57093749f3f2e6b691a5f6fe94d4bc088c11f5422a581b8d1f59f213d6305188598bef954dbc5732cef079787cd59fd93f92185f879845b4f5cb415d09e

    • SSDEEP

      393216:eqPnLFXlreQ8DOETgsvfG0v9gGxxvEohGoaktq:TPLFXNeQhEbVD0loy

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks