General

  • Target

    XenoV1.1.35.exe

  • Size

    7.5MB

  • Sample

    250129-1x1nvs1jdx

  • MD5

    9249788c0f960b29a33b402a1f4e7bbf

  • SHA1

    c8337e750556394b60d5bf6f03f6e318fccf5d04

  • SHA256

    9ff445abaaee326b82f9f4614c395faaf6333c242644398744d96943fa0bac95

  • SHA512

    4a4d45740e040bf45180191f9a18c3fbb55881a203846770d79113244d909d36f7950baabc0e8e5f0599bc8629044ae02ad3f8aad8898c401fec62510286d973

  • SSDEEP

    196608:x81dFwfI9jUCnORird1KfbLOYgN2oc+nBIdAxI:SOIHOQ76bynnBIV

Malware Config

Targets

    • Target

      XenoV1.1.35.exe

    • Size

      7.5MB

    • MD5

      9249788c0f960b29a33b402a1f4e7bbf

    • SHA1

      c8337e750556394b60d5bf6f03f6e318fccf5d04

    • SHA256

      9ff445abaaee326b82f9f4614c395faaf6333c242644398744d96943fa0bac95

    • SHA512

      4a4d45740e040bf45180191f9a18c3fbb55881a203846770d79113244d909d36f7950baabc0e8e5f0599bc8629044ae02ad3f8aad8898c401fec62510286d973

    • SSDEEP

      196608:x81dFwfI9jUCnORird1KfbLOYgN2oc+nBIdAxI:SOIHOQ76bynnBIV

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks