General

  • Target

    Xeron R6.exe

  • Size

    9.0MB

  • Sample

    241221-wce47svnfq

  • MD5

    63a626f1a53aa4aab64a096245c4bca0

  • SHA1

    5d1c6049423e123d49d3226aa305ae517d04e9da

  • SHA256

    7b3000bfc5b7dc42803ed95814e170d758338421bd44e664d3257ba45baf9124

  • SHA512

    5aca9b5e28bcec00fd0b61c3c2d51d9b24a32d2190e49a8e387cf525aaff5a791e836d47720e8f0f4486040088c9c30cebc8168dfed999fd7aeac5eb91fe202d

  • SSDEEP

    196608:e5gCDwfI9jUC2gYBYv3vbW4SEA+iITm1U6fX:FCwIH2gYBgDWZ+TOz/

Malware Config

Targets

    • Target

      Xeron R6.exe

    • Size

      9.0MB

    • MD5

      63a626f1a53aa4aab64a096245c4bca0

    • SHA1

      5d1c6049423e123d49d3226aa305ae517d04e9da

    • SHA256

      7b3000bfc5b7dc42803ed95814e170d758338421bd44e664d3257ba45baf9124

    • SHA512

      5aca9b5e28bcec00fd0b61c3c2d51d9b24a32d2190e49a8e387cf525aaff5a791e836d47720e8f0f4486040088c9c30cebc8168dfed999fd7aeac5eb91fe202d

    • SSDEEP

      196608:e5gCDwfI9jUC2gYBYv3vbW4SEA+iITm1U6fX:FCwIH2gYBgDWZ+TOz/

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks