General
-
Target
Xeno.exe
-
Size
5.9MB
-
Sample
250127-gvk1vawldj
-
MD5
6419b6a0c20d3e4d375cd9ef2b0fa263
-
SHA1
2246ea72640ef84a4b7df293008191c0962d1ee0
-
SHA256
cafe6236c0d13a491e8622b8b1cd7c6ba2b1fa23b315caed016e4fdcc5d92325
-
SHA512
03eb01b3dcb98436e0829116ae8091a478737bab0d9aa7b6d30abb766bec22240ff23b058670fcccd494903181b08d1c186638405633c4f175fffa445a0267b9
-
SSDEEP
98304:Dl+WCS8i65sn6Wfz7pnxCjJaWlpx1dstaNoSwKHf1c3z5MOueAeFP9hZkrn0InVt:D4m6DOYjJlpZstQoS9Hf12VKXQbZCBVt
Behavioral task
behavioral1
Sample
Xeno.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Xeno.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Xeno.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
Xeno.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
� >�_s.pyc
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
� >�_s.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
� >�_s.pyc
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral8
Sample
� >�_s.pyc
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Xeno.exe
-
Size
5.9MB
-
MD5
6419b6a0c20d3e4d375cd9ef2b0fa263
-
SHA1
2246ea72640ef84a4b7df293008191c0962d1ee0
-
SHA256
cafe6236c0d13a491e8622b8b1cd7c6ba2b1fa23b315caed016e4fdcc5d92325
-
SHA512
03eb01b3dcb98436e0829116ae8091a478737bab0d9aa7b6d30abb766bec22240ff23b058670fcccd494903181b08d1c186638405633c4f175fffa445a0267b9
-
SSDEEP
98304:Dl+WCS8i65sn6Wfz7pnxCjJaWlpx1dstaNoSwKHf1c3z5MOueAeFP9hZkrn0InVt:D4m6DOYjJlpZstQoS9Hf12VKXQbZCBVt
-
Deletes Windows Defender Definitions
Uses mpcmdrun utility to delete all AV definitions.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
� >�_s.pyc
-
Size
857B
-
MD5
89d29166436ad0bd343ffa905c13a090
-
SHA1
ad5cb5664d8a97519a608d5be077c2dcace8563a
-
SHA256
779e0c92c295910c5b0722d6ef71683f26b95370f51abeec5a62832ab410fa68
-
SHA512
f9901a2b88de55d2b89f29322da964a2b3676dd53c47cad8f88d8d74a3835032c519b1f5157cf4e6fedab9ad5e2d82eea902dd4c15ad3ddb0ac497acf521d020
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3