General
-
Target
XSpammer-Windows-Installer.exe
-
Size
78.4MB
-
Sample
250414-efa6zszwhx
-
MD5
3fea7be3e7408542c5d571ed82819307
-
SHA1
257ed424e5c043e3d64e5a98332a04ba42eb4ff9
-
SHA256
3b278965a9bc1f64fe6f120c753e19079962a035529b0d7143ee5de3be1c3b9f
-
SHA512
342164f6dbed1ab38b651eb406194663404e739cbfd33c11162abe4f601c2590e2c4cebb90337cef0441b5c242cda72e2cc42c659e1c35948dd0c575eb85e3e3
-
SSDEEP
1572864:HZzMgaq98HmYOY1TltopGun6WF4DCe620hpeDhghTQBlGJk054uzzJth1jYpa3:SK9OVTtopGyPKERhpeDGGlG2sDHV1jim
Behavioral task
behavioral1
Sample
XSpammer-Windows-Installer.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
XSpammer-Windows-Installer.exe
-
Size
78.4MB
-
MD5
3fea7be3e7408542c5d571ed82819307
-
SHA1
257ed424e5c043e3d64e5a98332a04ba42eb4ff9
-
SHA256
3b278965a9bc1f64fe6f120c753e19079962a035529b0d7143ee5de3be1c3b9f
-
SHA512
342164f6dbed1ab38b651eb406194663404e739cbfd33c11162abe4f601c2590e2c4cebb90337cef0441b5c242cda72e2cc42c659e1c35948dd0c575eb85e3e3
-
SSDEEP
1572864:HZzMgaq98HmYOY1TltopGun6WF4DCe620hpeDhghTQBlGJk054uzzJth1jYpa3:SK9OVTtopGyPKERhpeDGGlG2sDHV1jim
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3