General

  • Target

    Xeno (1).exe

  • Size

    7.6MB

  • Sample

    250121-jz9acavjet

  • MD5

    f891caabe2ede658e8dde07871b83434

  • SHA1

    6e076b6ef98f5edd31fa721361ac890a1bba3b8d

  • SHA256

    e8623a8c771bcaa0ccaaae95d4b3723932be3df01887a064609d5a791d7f2134

  • SHA512

    3bdd8c9792548815fa7bd878f0d1ccce820d6ff88fb7e669b1ef9145a51cbd8b349d4c380b76b6c073f807d88da220da1ee3571e5b56876c4afae0b33f582e45

  • SSDEEP

    196608:BVD+kdxwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWf:35kIHL7HmBYXrYoaUN4

Malware Config

Targets

    • Target

      Xeno (1).exe

    • Size

      7.6MB

    • MD5

      f891caabe2ede658e8dde07871b83434

    • SHA1

      6e076b6ef98f5edd31fa721361ac890a1bba3b8d

    • SHA256

      e8623a8c771bcaa0ccaaae95d4b3723932be3df01887a064609d5a791d7f2134

    • SHA512

      3bdd8c9792548815fa7bd878f0d1ccce820d6ff88fb7e669b1ef9145a51cbd8b349d4c380b76b6c073f807d88da220da1ee3571e5b56876c4afae0b33f582e45

    • SSDEEP

      196608:BVD+kdxwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWf:35kIHL7HmBYXrYoaUN4

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks