General

  • Target

    KabisoXiit vPrime 2,9 !!!.exe

  • Size

    7.7MB

  • Sample

    250122-nzxzjavmcz

  • MD5

    63c9183d9661079e905122a3e2cf7f20

  • SHA1

    d7dc54967b519dbc4e5d02653f7ffcf4a5d4ab06

  • SHA256

    4f2fead90663b4cf8fb3ac17aa500a20b70feb3da5a13d9dd146cbb97f269eb3

  • SHA512

    00fcbf21074b513ffb8fb4f0b8072fc3e5169ef64e17a660751a2971a4c738a3d1c871f87eec7763c238eb5cd75377c0c66678b9c449aa603a945bcd32f6849d

  • SSDEEP

    196608:/M015QmGqqeNTfm/pf+xk4dWRatrbWOjgKU:NQmGqly/pWu4kRatrbvMKU

Malware Config

Targets

    • Target

      KabisoXiit vPrime 2,9 !!!.exe

    • Size

      7.7MB

    • MD5

      63c9183d9661079e905122a3e2cf7f20

    • SHA1

      d7dc54967b519dbc4e5d02653f7ffcf4a5d4ab06

    • SHA256

      4f2fead90663b4cf8fb3ac17aa500a20b70feb3da5a13d9dd146cbb97f269eb3

    • SHA512

      00fcbf21074b513ffb8fb4f0b8072fc3e5169ef64e17a660751a2971a4c738a3d1c871f87eec7763c238eb5cd75377c0c66678b9c449aa603a945bcd32f6849d

    • SSDEEP

      196608:/M015QmGqqeNTfm/pf+xk4dWRatrbWOjgKU:NQmGqly/pWu4kRatrbvMKU

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks