General

  • Target

    frowning_tool build 1.3.exe

  • Size

    156KB

  • Sample

    240325-kjw6hsbd68

  • MD5

    ac0419c1af343890250f5fca61517f9d

  • SHA1

    d9a2685fbc661003b35b18bde3aa8a71e6a8d888

  • SHA256

    98c5b5e5f167fd7ba7a18652c83cbd8d2dfaf52e1dcbcd91853ef9a259042ab0

  • SHA512

    2b6bbe49d57efb14082d1d1bcf23645c3e0ccfbc5f69cc2c6d9df30ef1144b246b93e4ce8d6663afa7ee9ccb4307f52bcf9c37fe212c450846824ce6c7a1a6b1

  • SSDEEP

    1536:EgpHmVauo3mL/pDj6CSYebFNTf43joObhfT7zM:Egp4L/pHvQbFNmjo0FPzM

Malware Config

Extracted

Family

xenorat

C2

37.120.141.155

Mutex

modtool2

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    22914

  • startup_name

    WinSCVUpdate

Targets

    • Target

      frowning_tool build 1.3.exe

    • Size

      156KB

    • MD5

      ac0419c1af343890250f5fca61517f9d

    • SHA1

      d9a2685fbc661003b35b18bde3aa8a71e6a8d888

    • SHA256

      98c5b5e5f167fd7ba7a18652c83cbd8d2dfaf52e1dcbcd91853ef9a259042ab0

    • SHA512

      2b6bbe49d57efb14082d1d1bcf23645c3e0ccfbc5f69cc2c6d9df30ef1144b246b93e4ce8d6663afa7ee9ccb4307f52bcf9c37fe212c450846824ce6c7a1a6b1

    • SSDEEP

      1536:EgpHmVauo3mL/pDj6CSYebFNTf43joObhfT7zM:Egp4L/pHvQbFNmjo0FPzM

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks