General
-
Target
Xeno-v1.1.3-x64.rar
-
Size
14.2MB
-
Sample
250211-wybznswlev
-
MD5
33c462d92c1fd50b190c7e1a9bf81b83
-
SHA1
2b10cb847946fa1a44bbdf26da10003574ce8f01
-
SHA256
ad23e27a15e3d2451162bdfa17c56a26e4ee9c8892ab6964275d9dedbdff84b5
-
SHA512
75212f758ebac8405465b4a98c3559f0f9f546929925eca52c43af9137db5077ec785caa3b36ee1ec6d5fbc94c1f6a36b9feaf427baa065e6b9b95706640f24a
-
SSDEEP
393216:DaGqi2oTzgVZMgXtLNm0+0DS1psZ6QMqMGpq3/Lv:7qN6gQg9LNhFm164QM/Gpq3/Lv
Behavioral task
behavioral1
Sample
Xeno-v1.1.3-x64/Xeno.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Xeno-v1.1.3-x64/Xeno.exe
Resource
win11-20250211-en
Behavioral task
behavioral3
Sample
Xeno-v1.1.3-x64/XenoUI.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Xeno-v1.1.3-x64/XenoUI.exe
Resource
win11-20250211-en
Behavioral task
behavioral5
Sample
Xeno-v1.1.3-x64/XenoUI.exe
Resource
win7-20250207-en
Malware Config
Extracted
xworm
127.0.0.1:5552
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
Xeno-v1.1.3-x64/Xeno.exe
-
Size
10.8MB
-
MD5
a10ae5339c94657875b5991d2b4fb0d0
-
SHA1
6bd22c7d3e7ad538e2d8da2ea1e20257795994eb
-
SHA256
0f669ab830e863c182ec5573e59625f76b69db6963e78c868c76e74128f86e2b
-
SHA512
ac15657ed86595279cf2f529a917040a2687e49c953f36973c28147c95fd8d8787df008526c1d4ca5cfdb14d32c1f465242f0f552f264499b476ee3531a7e2ab
-
SSDEEP
196608:M+AQcHKApx3ivNm1E8giq1g9mveNo+wfm/pf+xfdkR6HAxKwCr2WOHWKD3beH:6Qctn3i1m1Nqao+9/pWFGRZ0br2W673k
-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Exelastealer family
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
Xeno-v1.1.3-x64/XenoUI.dll
-
Size
95KB
-
MD5
0c693fdf5031de28e139121866d4e71f
-
SHA1
d4e3f81ce0ac00efbc537b6aa4ebc07f039aaf9a
-
SHA256
3788b42e87c69c077868856b07c03e8606e0f49389c947231701100d99337e1c
-
SHA512
4298a579eea032e794ac4aaa2e18c793fbe0d3f33a2f8e948fde510427e604f06072b71703183c9ca88c73a805627187241f47845a9f16822243388ae5cb42af
-
SSDEEP
1536:gOTgjZ0JbSfMuafhOWR42zxMVY6dTPr/Wa5iiphLuM/APHV5y6SlSW8zXR:bT+WytdTPr/WAbK7Pby6S+zXR
-
Detect Xworm Payload
-
Xworm family
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Xeno-v1.1.3-x64/XenoUI.exe
-
Size
82KB
-
MD5
cead4ff10b38e2da24c55582ce8602ea
-
SHA1
efbf5d6df5a8a928d8b2a00f14c94472d5708b32
-
SHA256
3da936a74e79a858404e820a7d0f9efd290d9299dd49a55305a865d07bd3d69a
-
SHA512
fc599e31caad9cec48143a8d1ad8536e6af980a5b98350c44d15ae81c9eb8e7141c1e0ca3a5896f45a0322dd97794c6cbb7c6dcbbed83f1f2f79ec59ac8b7140
-
SSDEEP
1536:IwIP5m99SZpD039LVdjMYWI7976Ob6G70ML476MrnEOstXl6daRG:IDo9wA9vjMSGOb6Gz4trEOsb6oG
-
Detect Xworm Payload
-
Xworm family
-
Downloads MZ/PE file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Permission Groups Discovery
1Local Groups
1Process Discovery
1Query Registry
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1System Network Connections Discovery
1