General

  • Target

    Xeno.exe

  • Size

    140KB

  • Sample

    241203-vqbs9svlfv

  • MD5

    4a2e503ab9a31880995e60ece8784b13

  • SHA1

    5248db95700f5e600c824e736d8d1223f620ddf8

  • SHA256

    5a7eb83a45bfb81b23485131a2f80820f3889c69c89257188ec6eb093f375dc9

  • SHA512

    908f03a9901aea84df72fa70318aacf773ecd76465f5c9495a89c26e48e7c83c0fadce4fe58e1f7567a3a76f125a9245a18a1b5d5b0d076e15baf3c843a093b5

  • SSDEEP

    3072:rjK4UGDHXrQ8hy7qgpHulWD9ZvZ5Pf3Ca10xuZ04ntfOUhBu7q:rjK4TDUqgpqWDLZ5H+xuZ04nhA

Malware Config

Targets

    • Target

      Xeno.exe

    • Size

      140KB

    • MD5

      4a2e503ab9a31880995e60ece8784b13

    • SHA1

      5248db95700f5e600c824e736d8d1223f620ddf8

    • SHA256

      5a7eb83a45bfb81b23485131a2f80820f3889c69c89257188ec6eb093f375dc9

    • SHA512

      908f03a9901aea84df72fa70318aacf773ecd76465f5c9495a89c26e48e7c83c0fadce4fe58e1f7567a3a76f125a9245a18a1b5d5b0d076e15baf3c843a093b5

    • SSDEEP

      3072:rjK4UGDHXrQ8hy7qgpHulWD9ZvZ5Pf3Ca10xuZ04ntfOUhBu7q:rjK4TDUqgpqWDLZ5H+xuZ04nhA

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Downloads MZ/PE file

    • A potential corporate email address has been identified in the URL: [email protected]

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks