General

  • Target

    3bbdaa00d0153f3dd06c1bfb5901c88129bd6692588b2cf9f7aa80836f547b92.zip

  • Size

    57KB

  • Sample

    241020-xrqpxswhpl

  • MD5

    22fb51e4189ad55585b292d97a9d4c43

  • SHA1

    9a4e278204631e630f27aa74f64d8c04686b8f79

  • SHA256

    e3306564878e080f2d3d0c271431f53cf434c5046106a483e095bed1ded33761

  • SHA512

    bc31297226672e67dd64ac1395008b7e4956f4c8b6866ed0a3724fd59abbce9b5fe460bc6991fdc84a5dc7173fbc48c1c51efd579779ad08ab2e704f53bb4b9f

  • SSDEEP

    1536:azOYoWrgYieGohlQWM2BdVMy6c8Jur5GuMOb:azpgYrDG2IJurh

Malware Config

Extracted

Family

xehook

Version

2.1.5 Stable

C2

https://t.me/+w897k5UK_jIyNDgy

Attributes
  • id

    208

  • token

    xehook208585951630880

Targets

    • Target

      3bbdaa00d0153f3dd06c1bfb5901c88129bd6692588b2cf9f7aa80836f547b92

    • Size

      151KB

    • MD5

      6e27a30914405fd496fc312e4a867e30

    • SHA1

      72f6b3a73c83b31a22ade0103d53d74d444bcb18

    • SHA256

      3bbdaa00d0153f3dd06c1bfb5901c88129bd6692588b2cf9f7aa80836f547b92

    • SHA512

      f779229af3cce1ee4dafcad697667170cccb0113f96c884593cc8aa425e115813487cb1ccab49df32ccfe79b8eaf8c290a6be3068a429322e3f75dc3a1620f8c

    • SSDEEP

      3072:30z6gqFfzyAy9qngIMZW5qor5H3mqwz+GFj/b1r9TxvcfYxwEKctzk:cifMqm9or5H3mqwz+GFj/b1r9TxvcfYQ

    • Xehook stealer

      Xehook is an infostealer written in C#.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks