General

  • Target

    4f66ddef14082dc213e3a5bac8debfef24027b5b5e9b3be5ac85bc13a31adf45.exe

  • Size

    331KB

  • Sample

    250318-d7ywpaxly2

  • MD5

    1c3c3d869eb0804b24ed9bb2fdd8f3f6

  • SHA1

    54a4f56bc708d2c4e72d744fd095bab33f4e7525

  • SHA256

    4f66ddef14082dc213e3a5bac8debfef24027b5b5e9b3be5ac85bc13a31adf45

  • SHA512

    42d1514c34f63c141defe08213f7f8f26b39bc5c27b558f6f54c4f8256bccebb984345629df75817d1194c86ac00f57acbd899a405609f48a880b95fcb85d386

  • SSDEEP

    6144:FqurA7Ow+h8xoQj7F93V0flM5gUICGN4nMd2pRnOb58++Xx1aa5+rsnFSEvfNH:curA7s8V7BlIpGdNI5j+B19vFSGf5

Malware Config

Targets

    • Target

      4f66ddef14082dc213e3a5bac8debfef24027b5b5e9b3be5ac85bc13a31adf45.exe

    • Size

      331KB

    • MD5

      1c3c3d869eb0804b24ed9bb2fdd8f3f6

    • SHA1

      54a4f56bc708d2c4e72d744fd095bab33f4e7525

    • SHA256

      4f66ddef14082dc213e3a5bac8debfef24027b5b5e9b3be5ac85bc13a31adf45

    • SHA512

      42d1514c34f63c141defe08213f7f8f26b39bc5c27b558f6f54c4f8256bccebb984345629df75817d1194c86ac00f57acbd899a405609f48a880b95fcb85d386

    • SSDEEP

      6144:FqurA7Ow+h8xoQj7F93V0flM5gUICGN4nMd2pRnOb58++Xx1aa5+rsnFSEvfNH:curA7s8V7BlIpGdNI5j+B19vFSGf5

    • Detect Xehook Payload

    • Xehook family

    • Xehook stealer

      Xehook is an infostealer written in C#.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks