General

  • Target

    Executor.rar

  • Size

    17.0MB

  • Sample

    240918-yawehszemj

  • MD5

    d00a3524c08e1803ef983a49b4c5628b

  • SHA1

    24758b6e125d76e35022631cd9b1b20b43a291b7

  • SHA256

    f94a2b15b4693b91d21fcecdf138a5580efaef8343f6ccbf9a703bfb1fc673e5

  • SHA512

    15f9dfd728122d4a13d27fa56cc25ac1fc69d962cde872fb9da5c23021ff2e3e6e9f836e2399aa50f2c07c44b958d96650133f0ec8b47b8f4fe6aa6e85985356

  • SSDEEP

    393216:CQozCcROiUUzgJnS9Q5U2lTDQL5vTOAdnOhgFybBFK:Roz7R9UUenx5UoDY6AdOhwyfK

Malware Config

Targets

    • Target

      Executor/Xeno-v1.0.5-x64/Xeno.exe

    • Size

      10.1MB

    • MD5

      2826a602b5687a0078f9b89024c4b0a6

    • SHA1

      2a3a1d471e1355ae28d2814aa36be2c5447da0d3

    • SHA256

      fcd90d8b4eb41cca2b72f845d5c5b2524e8d71cc711e35fd32c3096bf0227f68

    • SHA512

      cb05d5e1f609ae6a74f6da259353f86e70fa7be0955344e90e72957e64f7e76f2739c1233385d8eef14caa0f4d7682967a31d6d7bdcad5f9905d0e55ddc7e2a8

    • SSDEEP

      196608:08xvfYhy8/48hFsmOq9MSYQOieDi+V5Da1QPbQcTkym3MeNyrZc:0evfuy8/bQmOIYLiuQE8cTkz3Di

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks