General
-
Target
Xeno Download.exe
-
Size
231KB
-
Sample
250125-ee82mavjez
-
MD5
172d2aa12988e776eaf589bb2a512827
-
SHA1
f30c2d9a29a2e853ffa77205b4a2548cc0cef8af
-
SHA256
790373ad099621fefbbe0df00c3c9c1bc671d5f5aacca55f37e844e3d8b517ce
-
SHA512
b417e81f10b9c24bf3e6cb4852a8455d26ecc4462604a709ea9a11c1a25f674f1e890818f196111f44e2c2956117cd5726119c01b20c1286a92a4485c631f4f2
-
SSDEEP
6144:RloZM+rIkd8g+EtXHkv/iD4kFu9IuphCln6opNswlb8e1mXlExi:joZtL+EP8kFu9IuphCln6opNsw2p
Behavioral task
behavioral1
Sample
Xeno Download.exe
Resource
win7-20240903-en
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1332520219452768297/tCosfoZIbGVyGJrBCbcoypdjWsz1tc2GtbBXf7i8mWs2kn2NMmPVxus4qdn8X4Ou9SMV
Targets
-
-
Target
Xeno Download.exe
-
Size
231KB
-
MD5
172d2aa12988e776eaf589bb2a512827
-
SHA1
f30c2d9a29a2e853ffa77205b4a2548cc0cef8af
-
SHA256
790373ad099621fefbbe0df00c3c9c1bc671d5f5aacca55f37e844e3d8b517ce
-
SHA512
b417e81f10b9c24bf3e6cb4852a8455d26ecc4462604a709ea9a11c1a25f674f1e890818f196111f44e2c2956117cd5726119c01b20c1286a92a4485c631f4f2
-
SSDEEP
6144:RloZM+rIkd8g+EtXHkv/iD4kFu9IuphCln6opNswlb8e1mXlExi:joZtL+EP8kFu9IuphCln6opNsw2p
-
Detect Umbral payload
-
Umbral family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1