General

  • Target

    slavaukraine.exe

  • Size

    51KB

  • Sample

    240322-tfl1tade58

  • MD5

    6bf6a964e383a98471d0c433b0ab0502

  • SHA1

    8414bfd5a7fb12c708c1e602153cf19c7f5ec688

  • SHA256

    592895fdb62c7688e95d594ed6c46fcf3ab8de094f4039784301b352314d61c0

  • SHA512

    5f4bfb88582d5ff171e71f210a961adcc39e120e1d1b8627f52403b1db2bb0dae5bd3548a9a3e15915ad40c8e5f1cdc1964c9ea096b8924f2b682f5c9c3ef775

  • SSDEEP

    768:EWivdjHrddilbVauou79Eo4WqmTBvsHMBSkGu2yPo+LGZYebFDaau6RNSgNOZ/:E3pHmVauo325vVDj6CSYebFjrf4x

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

37.120.141.155

Mutex

morzorg

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    22914

  • startup_name

    WinSCVUpdate

Targets

    • Target

      slavaukraine.exe

    • Size

      51KB

    • MD5

      6bf6a964e383a98471d0c433b0ab0502

    • SHA1

      8414bfd5a7fb12c708c1e602153cf19c7f5ec688

    • SHA256

      592895fdb62c7688e95d594ed6c46fcf3ab8de094f4039784301b352314d61c0

    • SHA512

      5f4bfb88582d5ff171e71f210a961adcc39e120e1d1b8627f52403b1db2bb0dae5bd3548a9a3e15915ad40c8e5f1cdc1964c9ea096b8924f2b682f5c9c3ef775

    • SSDEEP

      768:EWivdjHrddilbVauou79Eo4WqmTBvsHMBSkGu2yPo+LGZYebFDaau6RNSgNOZ/:E3pHmVauo325vVDj6CSYebFjrf4x

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks