General
-
Target
https://disk.yandex.ru/d/VXyHfH3CjKxrnA
-
Sample
241003-x2afpasdmn
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://disk.yandex.ru/d/VXyHfH3CjKxrnA
Resource
win11-20240802-en
windows11-21h2-x64
25 signatures
1800 seconds
Malware Config
Extracted
Family
xehook
Version
2.1.5 Stable
C2
https://t.me/+w897k5UK_jIyNDgy
Attributes
-
id
349
-
token
xehook349969335337456
Targets
-
-
Target
https://disk.yandex.ru/d/VXyHfH3CjKxrnA
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-