General

  • Target

    Xeno-v1.1.3-x64.rar

  • Size

    14.2MB

  • Sample

    250211-wybznswlev

  • MD5

    33c462d92c1fd50b190c7e1a9bf81b83

  • SHA1

    2b10cb847946fa1a44bbdf26da10003574ce8f01

  • SHA256

    ad23e27a15e3d2451162bdfa17c56a26e4ee9c8892ab6964275d9dedbdff84b5

  • SHA512

    75212f758ebac8405465b4a98c3559f0f9f546929925eca52c43af9137db5077ec785caa3b36ee1ec6d5fbc94c1f6a36b9feaf427baa065e6b9b95706640f24a

  • SSDEEP

    393216:DaGqi2oTzgVZMgXtLNm0+0DS1psZ6QMqMGpq3/Lv:7qN6gQg9LNhFm164QM/Gpq3/Lv

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:5552

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

Targets

    • Target

      Xeno-v1.1.3-x64/Xeno.exe

    • Size

      10.8MB

    • MD5

      a10ae5339c94657875b5991d2b4fb0d0

    • SHA1

      6bd22c7d3e7ad538e2d8da2ea1e20257795994eb

    • SHA256

      0f669ab830e863c182ec5573e59625f76b69db6963e78c868c76e74128f86e2b

    • SHA512

      ac15657ed86595279cf2f529a917040a2687e49c953f36973c28147c95fd8d8787df008526c1d4ca5cfdb14d32c1f465242f0f552f264499b476ee3531a7e2ab

    • SSDEEP

      196608:M+AQcHKApx3ivNm1E8giq1g9mveNo+wfm/pf+xfdkR6HAxKwCr2WOHWKD3beH:6Qctn3i1m1Nqao+9/pWFGRZ0br2W673k

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      Xeno-v1.1.3-x64/XenoUI.dll

    • Size

      95KB

    • MD5

      0c693fdf5031de28e139121866d4e71f

    • SHA1

      d4e3f81ce0ac00efbc537b6aa4ebc07f039aaf9a

    • SHA256

      3788b42e87c69c077868856b07c03e8606e0f49389c947231701100d99337e1c

    • SHA512

      4298a579eea032e794ac4aaa2e18c793fbe0d3f33a2f8e948fde510427e604f06072b71703183c9ca88c73a805627187241f47845a9f16822243388ae5cb42af

    • SSDEEP

      1536:gOTgjZ0JbSfMuafhOWR42zxMVY6dTPr/Wa5iiphLuM/APHV5y6SlSW8zXR:bT+WytdTPr/WAbK7Pby6S+zXR

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      Xeno-v1.1.3-x64/XenoUI.exe

    • Size

      82KB

    • MD5

      cead4ff10b38e2da24c55582ce8602ea

    • SHA1

      efbf5d6df5a8a928d8b2a00f14c94472d5708b32

    • SHA256

      3da936a74e79a858404e820a7d0f9efd290d9299dd49a55305a865d07bd3d69a

    • SHA512

      fc599e31caad9cec48143a8d1ad8536e6af980a5b98350c44d15ae81c9eb8e7141c1e0ca3a5896f45a0322dd97794c6cbb7c6dcbbed83f1f2f79ec59ac8b7140

    • SSDEEP

      1536:IwIP5m99SZpD039LVdjMYWI7976Ob6G70ML476MrnEOstXl6daRG:IDo9wA9vjMSGOb6Gz4trEOsb6oG

    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Downloads MZ/PE file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks