Overview
overview
10Static
static
10Xeno-v1.1....no.dll
windows7-x64
1Xeno-v1.1....no.dll
windows10-2004-x64
1Xeno-v1.1....UI.exe
windows7-x64
1Xeno-v1.1....UI.exe
windows10-2004-x64
1Xeno-v1.1....50.exe
windows7-x64
7Xeno-v1.1....50.exe
windows10-2004-x64
8Xeno-v1.1....Env.js
windows7-x64
3Xeno-v1.1....Env.js
windows10-2004-x64
3General
-
Target
Xeno-v1.1.50-x64.zip
-
Size
6.3MB
-
Sample
250130-zcme3askbs
-
MD5
0284c2df0129ccdabb6c9dc74d3815e0
-
SHA1
12b6eaf900f6445616e9894bee89f0f53e172795
-
SHA256
2b41f560cf40e7efb69eeb4446e61a24504445b59cd66436788f0e63713bc989
-
SHA512
df58e8e9b68571128d981831f5eed7568cc3ec32f648b87473a5a14d909134100902fa82d83c1db7056c2cc944c067cdab1ab8f6f633249753e12c4cca5c68e8
-
SSDEEP
196608:uXc00BMnFTx7d8rso8hLJV46+PEbjQ97RR5y:iKczSrXGdC2bmP5y
Behavioral task
behavioral1
Sample
Xeno-v1.1.50-x64/Xeno.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Xeno-v1.1.50-x64/Xeno.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Xeno-v1.1.50-x64/XenoUI.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Xeno-v1.1.50-x64/XenoUI.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
Xeno-v1.1.50-x64/XenoV1.1.50.exe
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
Xeno-v1.1.50-x64/XenoV1.1.50.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
Xeno-v1.1.50-x64/scripts/UNCCheckEnv.js
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Xeno-v1.1.50-x64/scripts/UNCCheckEnv.js
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
Xeno-v1.1.50-x64/Xeno.dll
-
Size
1.3MB
-
MD5
6a635fa58e5455397180eda307fb64ba
-
SHA1
0e83defcbafec8c15707e2e71947e77d960a3648
-
SHA256
bd6843726688bd7253a42180bf95671ad5b0f9e787adb4f13250f484abd9eae4
-
SHA512
00a318b1fdb38efef39351e291fd8db9bd096307a1b6319191cfcbef6d5b7e0486cb19968291f64d3d2fe48e062bbfdec9c2e185010848b7df87bead4eac2fbb
-
SSDEEP
24576:8HVrqyQ8I2dBY8rekRCw7qb+sOZaDKSiEEemqzipKB:8HVrqbuYw75ZOVviE
Score1/10 -
-
-
Target
Xeno-v1.1.50-x64/XenoUI.dll
-
Size
95KB
-
MD5
a820e5f0298f087a8f7f1aced8b953d6
-
SHA1
d9e25cdb909b663305fad31d5bb5d8e6ee2e4d1b
-
SHA256
91a7ad538e10ff9131424a8b44292315d21dc42b0179ac29c550d61f81a6ff3d
-
SHA512
81e8ebb90dfcd3f8046a68a1fc2bfb21c31ac306a5bb1be2f84e735260f7a07b4fe1e453a3a512c4f0d99b10cb2c508895fc1e43463e38f3a0974b4548514c74
-
SSDEEP
1536:SSRxCnk7JSfUuafNmWR42zxMVY6dTPr1Wa5iiZhZuM/APHV5y6SlSW8/XR:1REWytdTPr1WAb87Pby6S+/XR
Score1/10 -
-
-
Target
Xeno-v1.1.50-x64/XenoV1.1.50.exe
-
Size
5.9MB
-
MD5
d5814e9ed4d5b64ab6802ebc45e2a781
-
SHA1
b12bdd7640ee98d8b2b8eb19bce1a5e1cb63deef
-
SHA256
fe8ecab9919b314990dedb5aeb5d72c92c36f6f51e4de0dad9e44e4e35624035
-
SHA512
7f9e7f44865cf8167f49605fc4724ec7bee372b2728d77d95f6809120bf85701f654bfab7e714cceeae62619079ad395981a4910d0067e4e0533793fa71d6240
-
SSDEEP
98304:NM+nh2Nji65sn6Wfz7pnxCjJaWlpx1dstaNoSwKHf1c3z5MOueAeFV9h/kr6lVbw:N3nCDOYjJlpZstQoS9Hf12VKXib/CmVC
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
Xeno-v1.1.50-x64/scripts/UNCCheckEnv.lua
-
Size
28KB
-
MD5
b76726d10354343d9af5c268e40b47c4
-
SHA1
7103c78071be0c65c8b3a217168cf7909aef748e
-
SHA256
e8d53406c916b8e827c65c8f00d8a18b1379e693fd0379e8116e749bdf860cf5
-
SHA512
5caffd8a06058e890fe4ae35430539281cf53fa791221189f0f6660778a83fa42cc3e5374ce06ff325420d92006c2bfe1003f1486714e889964075da66b046eb
-
SSDEEP
768:JopEYRzOKMrGrE7BWf9r+T+f9TkIuP4hUUsbU8FqQFBF5UXzRFEe3cSG5Sg/i5rx:JEKcZuy9p
Score3/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3