General

  • Target

    Autoplay.exe

  • Size

    257KB

  • Sample

    240430-xrbk1adh21

  • MD5

    edafbc9d7eef59cc07d0801e0be9f027

  • SHA1

    de3b479d16fbacba44239b0e2eda45367b9ebab1

  • SHA256

    6a2048d0dc927b97e9f0dc7b5610d10030958711933d7e980c1151ca841bfd7f

  • SHA512

    130b5c9e272ab4674649cdaac7ab1e2d68ce1c391786d95238988304feec9e0f9f659cdae4ec5ff81eb38924238324b67c566deff2c7ceed0e819f13820d0287

  • SSDEEP

    6144:fxKQdkTUGJXOjv5o1SDQPd04mhanTqvaGvzUlH07r:5KSkTUGRODePG4mhaXGvMH07r

Score
10/10

Malware Config

Extracted

Family

xehook

C2

https://unotree.ru/

https://aiwhcpoaw.ru/

Targets

    • Target

      Autoplay.exe

    • Size

      257KB

    • MD5

      edafbc9d7eef59cc07d0801e0be9f027

    • SHA1

      de3b479d16fbacba44239b0e2eda45367b9ebab1

    • SHA256

      6a2048d0dc927b97e9f0dc7b5610d10030958711933d7e980c1151ca841bfd7f

    • SHA512

      130b5c9e272ab4674649cdaac7ab1e2d68ce1c391786d95238988304feec9e0f9f659cdae4ec5ff81eb38924238324b67c566deff2c7ceed0e819f13820d0287

    • SSDEEP

      6144:fxKQdkTUGJXOjv5o1SDQPd04mhanTqvaGvzUlH07r:5KSkTUGRODePG4mhaXGvMH07r

    Score
    10/10
    • Detect Xehook Payload

    • Xehook stealer

      Xehook is an infostealer written in C#.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Collection

Data from Local System

2
T1005

Tasks