Xehook Stealer: Evolution of Cinoshi’s Project Targeting Over 100 Cryptocurrencies and 2FA Extensions

Xehook-Stealer

Key Takeaways

  • Xehook Stealer, discovered by CRIL in January 2024, is a .NET-based malware targeting Windows operating systems. 
  • The Stealer boasts dynamic data collection capabilities from Chromium and Gecko-based browsers, supporting over 110 cryptocurrencies and 2FA extensions. It also includes an API for creating custom traffic bots and a feature for recovering dead Google cookies. 
  • CRIL investigation reveals a potential connection between Xehook Stealer, Agniane, and the Cinoshi project. 
  • The sequence of events suggests a progression from the free MaaS Cinoshi Project to the emergence of Agniane Stealer and, eventually, Xehook Stealer, indicating possible rebranding and development iterations. 
  • SmokeLoader binaries have been identified as a common vector for distributing Xehook Stealer, indicating active propagation efforts. 
  • Xehook Stealer shares significant code overlaps with Agniane Stealer, suggesting an evolutionary relationship between the two. Configuration data similarities and communication with the same C&C server reinforce this connection. 
  • Similarities in web panel design between Cinoshi, Agniane, and Xehook Stealer panels further support the notion of continuous development and iteration. 

Overview

CRIL found a new stealer named Xehook in January 2024. Xehook Stealer targets the Windows operating system and is coded in the .Net programming language. The Threat Actor (TA) claims this stealer offers dynamic data collection from all Chromium and Gecko-based browsers, supporting over 110 cryptocurrencies and 2FA extensions. 

The TA behind this stealer also mentioned that it includes customizable build settings, seamless integration with Telegram for real-time notifications, and the ability to send logs directly to Telegram. Additionally, Xehook Stealer provides an API for creating custom traffic bots and includes a feature for recovering dead Google cookies. 

The TA claimed that this stealer gathers a wide range of data, including passwords, cookies, autofill information, and credit cards from browsers, alongside sessions from messaging platforms like Telegram and Discord. It supports over 15 desktop cryptocurrency wallets and includes a recursive file grabber for collecting specific file formats from user directories. 

Xehook Stealer is sold on a subscription model, which is available on a monthly, quarterly, and semi-annual basis, with prices ranging from $50 for one month to $600 for an unlimited period. An additional $100 provides access to the API for an indefinite duration, ensuring comprehensive support and functionality for subscribers. 

The figure below shows the Xehook stealer post on a cybercrime forum. 

Figure 1 – Xehook Stealer Post on a Cybercrime Forum

Notably, when this post about Xehook Stealer was made on a cybercrime forum, the TA’s username was “thx4drugs,” which was subsequently changed to “Agniane,” as indicated in the figure below.  

Figure 2 – TAs Renamed Account 

Upon further investigation, we discovered the emergence of a stealer named Agniane in August 2023, as reported by Zscaler. Notably, the Telegram handle mentioned in the Xehook stealer post corresponds to the one utilized by the Telegram bot associated with Agniane stealer. Interestingly, Agniane stealer is believed to have connections with the Cinoshi project, which CRIL initially uncovered in March 2023. This project operated under a Malware-as-a-Service (MaaS ) model, offering a stealer and web panel for free upon its launch. The following sequence of events unveils the connection between these projects: 

  • A TA launched the free MaaS Cinoshi Project in March 2023. 
  • Agniane Stealer emerged in August 2023. 
  • Agniane Stealer references Cinoshi in its note. 
  • The Telegram bot used by Agniane Stealer mentions the TA’s handle, Agniane, in its bio. 
  • A TA named thx4drugs posts about Xehook stealer on a cybercrime forum. 
  • The Xehook stealer post also mentions the same Telegram handle, “Agnianne,” as the Agniane stealer bot mentioned. 
  • The account of thx4drugs is later renamed to Agniane.  

Figure 3 – Linking TA Profiles

There is a high chance that the TA launched the Cinoshi project as a free M-a-a-S model to gain a user base, and after enhancing the product, the TA started renaming it on each iteration and selling it. We also observed a lot of similarities between the Web panel utilized by the Cinoshi project, Agniane stealer, and Xehook stealer, such as the same Font scheme and Structure of the panel. 

Figure 4 – Cinoshi Web Panel

Figure 5 – Agniane Web Panel (Source: Zscaler)

Figure 6 – Xehook Stealer Web Panel 

Overlaps with Agniane Stealer

During our analysis, we discovered that the Xehook stealer appears to be an upgraded iteration of the Agniane stealer, sharing many similarities in their code base and functionalities. Upon further investigation, we came across a Cisco report detailing the Agniane stealer; we observed that the configuration data mentioned therein closely resembled that of the Xehook stealer. However, we identified three additional fields in the Xehook stealer’s configuration, namely “selfmelf,” “domaindetect,” and “filext,” indicating that the Xehook stealer boasts enhanced capabilities compared to its predecessor. Furthermore, both stealer binaries were found to be communicating with the same command-and-control (C&C) server (hxxps://trecube[.]com/), following a similar sequence of requests, suggesting a strong connection between the two variants. 

Figure 7 – Code Overlaps

Initial Infection

During our investigation, we came across a SmokeLoader binary (Sha256: fa7f5300459c71d70f1f7b0d0c96aa245fad2a98d55d39a53455d2a7191d8cc9) that was responsible for downloading the loader for the Xehook stealer from below URL  

  • hxxps://45.15.156[.]174/index[.]php/s/24Sr2FjZQm8gXFA/download/ketamine[.]exe

Additionally, Spamhaus has reported an instance of a SmokeLoader binary distributing the Xehook stealer, indicating the active utilization of SmokeLoader in propagating the Xehook stealer payload. 

Technical Analysis

The initial file is a 32bit .NET loader which is obfuscated using a crypter. This loader consists of a time-based restriction or expiration check, where after a certain date (in this case, 14 days after February 24, 2024), the method will throw an exception and terminate the execution of the malware.  

This time-based restriction serves as a control mechanism for the malware author. It allows them to limit the lifespan of the malware, potentially evading detection, or analysis after a certain period. 

The figure below shows the time-based check. 

Figure 8 – Time-Based Check

After that, the Loader binary decodes the kernel32.dll name, which is stored in reverse order. It utilizes various functions of kernel32.dll, such as: 

  • FreeConsole() 
  • GetProcAddress() 
  • LoadLibraryA() 
  • CreateThread() 
  • WaitForSingleObject() 
  • VirtualProtect() 

The loader will later leverage a few of these functions to inject the Stealer payload.  

Figure 9 – Reversing DLL Name 

The loader proceeds to decrypt the encrypted stealer payload contained within a byte array. This decryption occurs in two stages: the data undergoes mathematical operations and XORing.  

The figure below shows the decryption process. 

Figure 10 – Decrypts Stealer Payload 

The loader initiates the execution of a legitimate Windows binary named RegAsm.exe located at “C:WindowsMicrosoft.NETFrameworkVersion_NumberRegAsm.exe”. It is an assembly registration tool primarily used to register .NET assemblies with COM (Component object model).  

The figure below shows the process tree. 

Figure 11 – Process Tree

Subsequently, it injects the stealer payload into the RegAsm.exe process. It utilizes functions such as VirtualAlloc, VirtualProtect, and WriteProcessMemory. This technique, known as Process Injection, is commonly utilized by malware to evade detection and defense mechanisms.  

The diagram below illustrates the Process Injection method. 

Figure 12 – Process Injection 

The stealer payload is a 64-bit .Net binary. It is highly obfuscated and stores the encrypted strings in a byte array. It uses a single decryption function that applies some XOR and SHIFT operations to all the strings passed to it as a parameter. Initially, the stealer payload decrypts the C&C URL, as shown in the figure below.  

  • hxxps://trecube[.]com/ 
  • hxxps://nc1337[.]online/ 

Figure 13 – Decrypts C&C URL 

Then, the stealer proceeds to confirm the availability of the C&C servers by employing the DownloadString() method of the WebClient instance. This method retrieves the web content of the designated C&C URL as a string. Subsequently, it inspects the returned value for the existence of “index.html.” If this string is found in the response, the stealer proceeds with the designated URL for C&C communications. The figure below shows the check for selecting the C&C URL.  

Figure 14 – Check of Selecting C&C

Now, the malware initiates a GET request to the below C&C URL:

  • hxxps://tricube[.]com/getjson[.]php?id=40 

In return, the C&C server sends configuration information for the stealer payload in JSON format. This configuration data likely contains instructions and settings for the malware to follow, specifying its behavior, targets, and other operational parameters.  

The figure below shows the Configuration data sent by the C&C server. 

Figure 15 – Configuration Data

The stealer payload then parses the configuration data by splitting it into an array and then initializes a dictionary to store key-value pairs for subsequent utilization.  

The Xehook Stealer contains a code snippet that appears to be checking for the presence of specific system languages. It initializes an array of CultureInfo objects representing different languages. Then, it iterates through the installed system language, comparing each language with the ones specified in the array. If any of the installed languages match the ones specified in the array, the stealer payload terminates itself. This mechanism is used for language-based checks or configurations within a software application.  

The stealer prevents its execution in the following countries.

System Language Code  Country 
{ru-RU}  Russia 
{kk-KZ}  Kazakhstan 
{ro-MD}  Moldova 
{uz-UZ}  Uzbekistan 
{be-BY}  Belarus 
{az-Latn-AZ}  Azerbaijan 
{hy-AM}  Armenia 
{ky-KG}  Kyrgyzstan 
{tg-Cyrl-TJ}  Tajikistan 

The figure below shows the decoded language codes. 

Figure 16 – Decoded Language Codes

After that, the stealer payload decrypts the names of processes associated with the malware analysis tools. Then, it employs the GetProcesses() method to retrieve the current list of running processes. It then compares these process names with the decrypted ones to determine if any match exists and terminates itself. This process allows the payload to identify potential instances of analysis or detection environments and avoid its execution.  

The following are the process names for which the stealer does an Anti-Analysis check.  

  • processhacker 
  • netstat 
  • netmon 
  • tcpview 
  • wireshark 
  • filemon 
  • regmon 
  • cain 

The Figure below shows the decryption process. 

Figure 17 – Decrypting Process Names

Next, the malware utilizes DateTime.Now.Ticks method to perform a Tick count. It is a known Anti-Analysis technique utilized by the environment to detect the sandbox environment, as virtual machines often exhibit different timing behaviors compared to physical machines due to the underlying virtualization layer.  

The figure below shows the tick count check.  

Figure 18 – Checking Tick Count 

Now, the stealer binary uses the Windows Management Instrumentation (WMI) query “Select * from Win32_ComputerSystem” to gather information about the computer system. This query retrieves various system properties, including details about the hardware, operating system, and potentially installed software. 

The stealer examines the data from the WMI query to determine if the computer is running in a virtual environment. It terminates itself if it finds strings like “VMware” or “VirtualBox,” often used with virtual machines.  

The figure below shows the WMI query.  

Figure 19 – Using WMI Query to Detect Virtualized Environment

Afterward, the stealer makes a GET request to the URL http://ip-api[.]com/json/?fields=11827, which returns a JSON response containing information about the IP address. This response consists of the following fields:  

  • country: Indicates the country where the IP address originates. 
  • countryCode: Provides the country code corresponding to the country. 
  • city: Specifies the city associated with the IP address (in this case, it’s empty). 
  • zip: Indicates the ZIP code of the location (empty in this response). 
  • isp: Represents the Internet Service Provider (empty in this response). 
  • org: Specifies the organization or company associated with the IP address (empty in this response). 
  • as: Provides information about the Autonomous System (AS) number or name (empty in this response). 
  • query: Provides the IP address from which the request originated. 

Subsequently, the Xehook stealer employs a MemoryStream object to temporarily store sensitive data collected from the victim’s system, which will be later converted to a stealer log.  

The Xehook stealer verifies the configuration data to identify files to extract from the victim’s system. The TA can define any file extension within the configuration, prompting the stealer to capture and transmit the specified files. In the stealer log data, these files will be stored under a folder named “Files”. The generated search event logs from the stealer payload are illustrated in the figure below. 

Figure 20 – File Grabber 

The TA asserted in the cybercrime forum post that this stealer can effectively target all Chromium and Gecko based browsers. We examined a technique employed by the TA to accomplish this. During its directory traversal process, the stealer appends “User DataLocal State” to the directories it traverses. The presence of this path indicates the installation of a Chromium-based browser on the victim’s system, allowing the stealer to proceed with the theft of browser-related data, including cookies, autofill, and login credentials. We did not observe this stealer binary targeting the Gecko browser. One possible reason could be that the stealer binaries are customizable through the web panel.  

In contrast to other stealers, this particular one dynamically stores stolen data and generates logs directly for data exfiltration. As a result, folders such as “Cookies” and “Autofill” are created within the log file structure to store specific types of data such as cookies and autofill information.  

This stealer configuration has a field named “domain detect”. The TAs utilize this field to steal login credentials for only domains they mention in the config data.  

The figure below shows the directory enumeration performed by the stealer to locate Chromium-based browsers. 

Figure 21 – Searching for Chromium-Based Browsers

We have observed over 110 chromium browser extensions, which this stealer targets. Each browser extension has a unique extension ID, so the stealer utilizes these IDs to search for extensions.  

The Xehook stealer targets the following extensions. 

Name  Extension ID  Name  Extension ID 
Splikity  Jhfjfclepacoldmjmkmdlmganfaalklb  YubiKey  mammpjaaoinfelloncbbpomjcihbkmmc 
Avira Password Manager  Caljgklbbfbcjjanaijlacgncafpegll  Google Authenticator  khcodhlfkpmhibicdjjblnkgimdepgnd 
iWallet  Kncchdigobghenbbaddojjnnaogfppfj  Microsoft Authenticator  bfbdnbpibgndpjfhonkflpkijfapmomn 
Wombat  Amkmjjmmflddogmhpjloimipbofnfjih  Authy  gjffdbjndmcafeoehgdldobgjmlepcal 
MEW CX  Nlbmnnijcnlegkjjpcfjclmcfggfefdm  Duo Mobile  eidlicjlkaiefdbgmdepmmicpbggmhoj 
NeoLine  Cphhlgmgameodnhkjdmkpanlelnlohao  OTP Auth  bobfejfdlhnabgglompioclndjejolch 
Terra Station  Aiifbnbfobpmeekipheeijimdpnlpgpp  FreeOTP  elokfmmmjbadpgdjmgglocapdckdcpkn 
Keplr  Dmkamcknogkgcdfhhbddcghachkejeap  Aegis Authenticator  ppdjlkfkedmidmclhakfncpfdmdgmjpm 
Sollet  Fhmfendgdocmcbmfikdcogofphimnkno  LastPass Authenticator  cfoajccjibkjhbdjnpkbananbejpkkjb 
ICONex  Flpiciilemghbmfalicajoolhkkenfel  Dashlane  flikjlpgnpcjdienoojmgliechmmheek 
KHC  Hcflpincpppdclinealmandijcmnkbgn  Keeper  gofhklgdnbnpcdigdgkgfobhhghjmmkj 
TezBox  Mnfifefkajgofkcjkemidiaecocnkjeh  RoboForm  hppmchachflomkejbhofobganapojjol 
Byone  Nlgbhdfgdhgbiamfdfmbikcdghidoadd  KeePass   lbfeahdfdkibininjgejjgpdafeopflb 
OneKey  Ilbbpajmiplgpehdikmejfemfklpkmke  KeePassXC  kgeohlebpjgcfiidfhhdlnnkhefajmca 
Trust Wallet  Pknlccmneadmjbkollckpblgaaabameg  Bitwarden  inljaljiffkdgmlndjkdiepghpolcpki 
MetaWallet   Pfknkoocfefiocadajpngdknmkjgakdg  NordPass  njgnlkhcjgmjfnfahdmfkalpjcneebpl 
Guarda Wallet  Fcglfhcjfpkgdppjbglknafgfffkelnm  LastPass  gabedfkgnbglfbnplfpjddgfnbibkmbb 
Exodus  Idkppnahnmmggbmfkjhiakkbkdpnmnon  Authenticator  bhghoamapcdpbohphigoooaddinpkbai 
Jaxx Liberty  Mhonjhhcgphdphdjcdoeodfdliikapmj  EOS Authenticator   oeljdldpnmdbchonielidgobddffflal 
Atomic Wallet  Bhmlbgebokamljgnceonbncdofmmkedg  BrowserPass  naepdomgkenhinolocfifgehidddafch 
Electrum  Hieplnfojfccegoloniefimmbfjdgcgp  MYKI   bmikpgodpkclnkgmnpphehdgcimmided 
Mycelium  Pidhddgciaponoajdngciiemcflpnnbg  Bread  jifanbgejlbcmhbbdbnfbfnlmbomjedj 
Coinomi  Blbpgcogcoohhngdjafgpoagcilicpjh  Airbitz  ieedgmmkpkbiblijbbldefkomatsuahh 
GreenAddress  Gflpckpfdgcagnbdfafmibcmkadnlhpj  KeepKey  dojmlmceifkfgkgeejemfciibjehhdcl 
Edge  Doljkehcfhidippihgakcihcmnknlphh  CommonKey  chgfefjpcobfbnpmiokfjjaglahmnded 
BRD  Nbokbjkelpmlgflobbohapifnnenbjlh  Zoho Vault  igkpcodhieompeloncfnbekccinhapdb 
Samourai Wallet  Apjdnokplgcjkejimjdfjnhmjlbpgkdi  Norton Password Manager  admmjipmmciaobhojoghlmleefbicajg 
Copay  ieedgmmkpkbiblijbbldefkomatsuahh  Trezor Password Manager  imloifkgjagghnncjkhggdhalmcnfklk 
Trezor  jpxupxjxheguvfyhfhahqvxvyqthiryh  MetaMask  nkbihfbeogaeaoehlefnkodbefgpgknn 
Ledger Live  pfkcfdjnlfjcmkjnhcbfhfkkoflnhjln  TronLink  ibnejdfjmmkpcnlpebklmnkoeoihofec 
Ledger Wallet  hbpfjlflhnmkddbjdchbbifhllgmmhnm  BinanceChain  fhbohimaelbohpjbbldcngcnapndodjp 
Bitbox  ocmfilhakdbncmojmlbagpkjfbmeinbd  Coin98  aeachknmefphepccionboohckonoeemg 
Digital Bitbox  dbhklojmlkgmpihhdooibnmidfpeaing     

Other browser extension IDs include. 

Extension IDs 
lbfeahdfdkibininjgejjgpdafeopflb  fijngjgcjhjmmpcmkeiomlglpeiijkld 
jbdaocneiiinmjbjlgalhcelgbejmnid  pdadjkfkgcafgbceimcpbkalnfnepbnk 
afbcbjpbpfadlkmhmclhkeeodmamcflc  bfnaelmomeimhIpmgjnjophhpkkoljpa 
hnfanknocfeofbddgcijnmhnfnkdnaad  fhilaheimglignddjgofkcbgekhenbh 
blnieiiffboillknjnepogjhkgnoac  mgfffbidihjpoaomajlbgchddlicgpn 
cgeeodpfagjceefieflmdfphplkenlfk  aodkkagnadcbobfpggnjeongemjbjca 
ocefimbphcgjaahbclemolcmkeanoagc  kpopkelmapcoipemfendmdghnegimn 
fihkakfobkmkjojpchpfgcmhfjnmnfpi  hmeobnffcmdkdcmlb1gagmfpfboieaf 
nfinomegcaccbhchhgflladpfbajihdf  Ipfcbjknijpeeillifnkikgncikgfhdo 
nanjmdkhkinifnkgdeggcnhdaammmj  dngmlblcodfobpdpecaadgfbeggfjfnm 
nkddgncdjgifcddamgcmfnlhccnimig  ejbalbakoplchlghecdalmeeeajnimhm 
fnnegphlobjdpkhecapkijjdkgcjhkib  mlbafbjadjidk1bhgopoamemfibcpdfi 
nphplpgoakhhjchkkhmiggakijnkhfnd  jnlgamecbpmbajjfhmmmlhejkemejdma 
penjlddjkjgpnkllboccdgccekpkcbin  ppbibelpcjmhbdihakflkdcoccbgbkpo 
fldfpgipfncgndfolcbkdeeknbbbnhcc  mcohilncbfahbmgdjkbpemcciiolgcge 
pnccjgokhbnggghddhahcnaopgeipafg  enabgbdfcbaehmbigakijjabdpdnimlg 
egjidjbpglichdcondbcbdnbeeppgdph  fopmedgnkfpebgllppeddmmochcookhc 
imlcamfeniaidioeflifonfjeeppblda  khpkpbbcccdmmclmpigdgddabeilkdpd 
ajkifnllfhikkjbjopkhmjoieikeihjb  lnnnmfcpbkafcpgdilckhmhbkkbpkmid 
kkpllkodjeloidieedojogacfhpaihoh  aholpfdialjgjfhomihkjbmgjidlcdno 
kgdijkcfiglijhaglibaidbipiejjfdp  kilnpioakcdndlodeeceffgjdpojajlo 
efbglgofoippbgcjepnhiblaibcnclgk  ebfidpplhabeedpnhjnobghokpiioolj 
onhogfjeacnfoofkfgppdlbmlmnplgbn  mdjmfdffdcmnoblignmgpommbefadffd 
phkbamefinggmakgklpkljjmgibohnba  aijcbedoijmgnlmjeegjaglmepbmpkpi 

This stealer also targets applications such as Steam, Telegram, Discord, and FileZilla. Additionally, the stealer captures a screenshot of the victim’s system, which will be saved as “Screenshot.jpg” in the log file.  

Once all the stolen data is gathered in the memory stream, it is converted into a byte array and then written to a log file utilizing the File.WriteAllBytes() method.  

The resulting log file is stored within a folder created under the AppDataLocal directory, with a name generated randomly using alphanumeric characters (A-Z, 0-9) and having a length of 32 characters. The figure below shows the method for storing the stolen data. 

Figure 22 – Writing Stolen Data to Disk

The following figure illustrates the malware directory with log files generated by the stealer. 

Figure 23 – Log File 

The figure below shows the “About PC.txt” file containing the infected machine’s system details. 

Figure 24 – About PC.txt 

Then, the malware starts exfiltrating the data using a POST request. It exfiltrates the data to the following URL: 

  • hxxps[:]//trecube[.]com/gate.php?id=40&build=new_cloudnever&passwords=0&cookies=0&username=&country=&ip=&BSSID=&wallets=0&token=xehook&ext=&filters=&pcname=&cardsc=&telegram=&discord=&steam=&domaindetect= 

The figure below shows the network activity.  

Figure 25 – Exfiltrating Data

After the upload operation, the code deletes the uploaded file from the victim’s system, potentially erasing any theft traces.  

The figure below shows the code for uploading and deleting log files. 

Figure 26 – Deleting the Log FIle 

Finally, the stealer is designed to throw a fake error message, providing a layer of deception to its operation. This fake error message is configurable by the threat actor (TA), who can choose whether the error message should be displayed and its content through the configuration settings.  

The figure below shows the fake error message box.  

Figure 27 – Fake Error Message Box 

Conclusion

Xehook Stealer is one of the few stealers with dynamic data collection capabilities and can target many browser extensions. The connection between Xehook Stealer, Agniane, and the Cinoshi project reveals a complex ecosystem of malware development and propagation. This linkage suggests a potential strategy of rebranding and iterative enhancement to evade detection and prolong malicious operations.  

The codebase, communication infrastructure, and distribution vectors overlap among entities like Xehook Stealer, Agniane, and the Cinoshi project, underscoring the interconnected nature of cyber threats. This overlap indicates that cybercriminals often reuse or repurpose code, infrastructure, and tactics across different malware variants and campaigns. As a result, proactive detection and robust defense mechanisms become essential to combat such threats effectively. 

Our Recommendations 

  • The initial entry point may originate via spam emails. Therefore, it’s advisable to deploy strong email filtering systems to identify and prevent the dissemination of harmful attachments. 
  • Deploy strong antivirus and anti-malware solutions to detect and remove malicious executable files. 
  • Enhance the system security by creating strong, distinct passwords for each of the accounts and, whenever feasible, activate two-factor authentication. 
  • Set up network-level monitoring to detect unusual activities or data exfiltration by malware. Block suspicious activities to prevent potential breaches. 
  • Enable two-factor authentication whenever possible for an additional layer of security. 
  • Periodically change your passwords, especially for sensitive accounts like email, banking, and social media. 
  • Regularly back up data to guarantee the ability to recover it in case of an infection and keep users informed about the most current phishing and social engineering methods employed by cybercriminals. 

MITRE ATT&CK® Techniques

Tactic   Technique   Procedure 
Execution  (TA0002)  User Execution (T1204)   The user needs to manually execute the   file.  
Defense Evasion (TA0005)  Obfuscated Files or  
Information (T1027) 
Binary may include packed or crypted  
data. 
Defense Evasion (TA0005)  Software Packing (T027.002)  Binary may include packed or crypted  
data. 
Defense Evasion (TA0005)  Deobfuscate/Decode Files or Information (T1140)  Decode data using Base64 in .NET 
Defense Evasion (TA0005)  Process Injection (T1055)  Loader injects stealer payload into  RegAsm.exe. 
Defense Evasion (TA0005)  Indicator Removal (T1070)  Delete the stealer logs.  
Credential  
Access (TA0006) 
OS Credential Dumping 
(T1003) 
Tries to harvest and steal browser  
information (cookies, passwords, etc) 
Discovery  
(TA0007) 
System Information  
Discovery (T1082) 
Queries the system information  
(host name, IP address, etc). 
Discovery  
(TA0007) 
File and Directory Discovery 
(T1083) 
Stealer enumerate files for grabbing. 
Collection 
(TA0009) 
Data from Local System 
(T1005) 
Tries to harvest and steal browser information (cookies, passwords, etc) 
Collection 
(TA0009) 
Archive Collected Data 
(T1560) 
Stealer compress the stolen data with  
ZIP extension. 
C&C 
(TA0011) 
Application Layer Protocol 
(T1071) 
Malware exe communicate to C&C server. 

Indicators of Compromise (IOCs)

Indicators     Indicator  
Type  
Description  
a3882ac90190c7ccbea744dde58f0a107b67e3eea0024b12d18e72faf9a55b1c  SHA256  Loader  Xehook stealer 
daea71a3094e0c90554a77e95b0b354d1515f99e70fa5013f09302a5bb04dde0  SHA256  Xehook Stealer  Binary 
hxxps://trecube[.]com/ hxxps://nc1337[.]online/  URL  C&C 
fa7f5300459c71d70f1f7b0d0c96aa245fad2a98d55d39a53455d2a7191d8cc9  SHA256  SmokeLoader 
hxxps://45.15.156.174/index[.]php/s/24Sr2FjZQm8gXFA/download/ketamine[.]exe  URL   Malicious URL 

 

 

The post Xehook Stealer: Evolution of Cinoshi’s Project Targeting Over 100 Cryptocurrencies and 2FA Extensions appeared first on Cyble.




Source: Original Post