General

  • Target

    Xeno.exe

  • Size

    140KB

  • Sample

    240927-x2klnaxepa

  • MD5

    c46b7e54e4b1e74eb907ed460c632350

  • SHA1

    2a45cbb31a1c8808f3cc5e2606b9fe07a6ec0e57

  • SHA256

    c79b8c1edf139d35dff7a26fd1ea4ba940133634fdc2e9bc7e5d571a707561e1

  • SHA512

    8675f593d0f18e35df70bb8ec82915ca8713a513dda1c3a71ec94735d61e4d0fa770bfa42904ca9533aa89ede95bff4a3ce926efa74ddec91292aa812a5771fb

  • SSDEEP

    3072:rjK4UGDHXrQ8hy7qgpHulWD9ZvZ5Pf3Ca10xuZ04ntfOUhBu7W:rjK4TDUqgpqWDLZ5H+xuZ04nhA

Malware Config

Targets

    • Target

      Xeno.exe

    • Size

      140KB

    • MD5

      c46b7e54e4b1e74eb907ed460c632350

    • SHA1

      2a45cbb31a1c8808f3cc5e2606b9fe07a6ec0e57

    • SHA256

      c79b8c1edf139d35dff7a26fd1ea4ba940133634fdc2e9bc7e5d571a707561e1

    • SHA512

      8675f593d0f18e35df70bb8ec82915ca8713a513dda1c3a71ec94735d61e4d0fa770bfa42904ca9533aa89ede95bff4a3ce926efa74ddec91292aa812a5771fb

    • SSDEEP

      3072:rjK4UGDHXrQ8hy7qgpHulWD9ZvZ5Pf3Ca10xuZ04ntfOUhBu7W:rjK4TDUqgpqWDLZ5H+xuZ04nhA

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks