General
-
Target
Zexo.exe
-
Size
63KB
-
Sample
250329-n5kldstqz3
-
MD5
fe21311e262630af1a54520f55ca8c69
-
SHA1
1d595196ae495436868b9b6d5f0d17d04a5ff8ef
-
SHA256
62ab616a986ed8d7725c5c37122c385b7ad30b9e02d659e950fa099c9b8d9ed3
-
SHA512
c89d654df3ab13762f1cf529d5526da7716bc61c6634d3255a0f01a4708a2701513cd45c0079f95d089df127f73386a83b0a19b1a09b5b2b28d0cb43946ce97f
-
SSDEEP
768:jnuguX1wbgyX78dIC8A+XkuazcBRL5JTk1+T4KSBGHmDbD/ph0oXpdM7nNqSuEdP:rvCCPTDdSJYUbdh9jMXuEdpqKmY7
Behavioral task
behavioral1
Sample
Zexo.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
asyncrat
Default
147.185.221.21:27180
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Zexo.exe
-
Size
63KB
-
MD5
fe21311e262630af1a54520f55ca8c69
-
SHA1
1d595196ae495436868b9b6d5f0d17d04a5ff8ef
-
SHA256
62ab616a986ed8d7725c5c37122c385b7ad30b9e02d659e950fa099c9b8d9ed3
-
SHA512
c89d654df3ab13762f1cf529d5526da7716bc61c6634d3255a0f01a4708a2701513cd45c0079f95d089df127f73386a83b0a19b1a09b5b2b28d0cb43946ce97f
-
SSDEEP
768:jnuguX1wbgyX78dIC8A+XkuazcBRL5JTk1+T4KSBGHmDbD/ph0oXpdM7nNqSuEdP:rvCCPTDdSJYUbdh9jMXuEdpqKmY7
-
Asyncrat family
-
Stealerium family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1