General

  • Target

    XenixExecutor.exe

  • Size

    18.7MB

  • Sample

    241201-gk34nsxrb1

  • MD5

    0c675237c53eaff23650cead0d925d6a

  • SHA1

    ed8f7f7e977542d91fbaa5af130bc3ad9503afab

  • SHA256

    77902390fcae44919bc92a43cc83544ad7669e936872150f8c39285c53bdb7c8

  • SHA512

    c16f4125a4d41c1f314bfed1b9f875f171829284cc15dc5baededdc8524696feb81ab0e1fe0c52b80a950f1b490b58574820c6de8b20d6f8e4851abd3df81699

  • SSDEEP

    393216:4qPnLFXlr4QMDOETgs77fGCgz2s+vENsfP3gUqm:pPLFXN4QRE79A2iA3z

Malware Config

Targets

    • Target

      XenixExecutor.exe

    • Size

      18.7MB

    • MD5

      0c675237c53eaff23650cead0d925d6a

    • SHA1

      ed8f7f7e977542d91fbaa5af130bc3ad9503afab

    • SHA256

      77902390fcae44919bc92a43cc83544ad7669e936872150f8c39285c53bdb7c8

    • SHA512

      c16f4125a4d41c1f314bfed1b9f875f171829284cc15dc5baededdc8524696feb81ab0e1fe0c52b80a950f1b490b58574820c6de8b20d6f8e4851abd3df81699

    • SSDEEP

      393216:4qPnLFXlr4QMDOETgs77fGCgz2s+vENsfP3gUqm:pPLFXN4QRE79A2iA3z

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks