General

  • Target

    4edcb51c961470638828b8f48a0259fb4b9645192f0b30e1d79b789c9b4c4d7f

  • Size

    45KB

  • Sample

    240331-jh6g5agg37

  • MD5

    0b4ced1e11fac0306ee8d9411aea4219

  • SHA1

    254c74fa4b822381dfb2d258ad77b9935ad619c6

  • SHA256

    4edcb51c961470638828b8f48a0259fb4b9645192f0b30e1d79b789c9b4c4d7f

  • SHA512

    76d0b8d66a84ac66b6ba6a08ad5e2e9ee1f9893c182b4e1be1f236a69bdbeb91139a1b8936e87eb2fed44627f5afc63a30404e279d840a27e5de0926a7a07eed

  • SSDEEP

    768:tdhO/poiiUcjlJInLzo4mH9Xqk5nWEZ5SbTDaoWI7CPW5V:jw+jjgnw4mH9XqcnW85SbTJWId

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

217.63.234.90

Mutex

Xeno_rat_nd8912ddd

Attributes
  • delay

    3500

  • install_path

    appdata

  • port

    8808

  • startup_name

    svchost.exe

Targets

    • Target

      4edcb51c961470638828b8f48a0259fb4b9645192f0b30e1d79b789c9b4c4d7f

    • Size

      45KB

    • MD5

      0b4ced1e11fac0306ee8d9411aea4219

    • SHA1

      254c74fa4b822381dfb2d258ad77b9935ad619c6

    • SHA256

      4edcb51c961470638828b8f48a0259fb4b9645192f0b30e1d79b789c9b4c4d7f

    • SHA512

      76d0b8d66a84ac66b6ba6a08ad5e2e9ee1f9893c182b4e1be1f236a69bdbeb91139a1b8936e87eb2fed44627f5afc63a30404e279d840a27e5de0926a7a07eed

    • SSDEEP

      768:tdhO/poiiUcjlJInLzo4mH9Xqk5nWEZ5SbTDaoWI7CPW5V:jw+jjgnw4mH9XqcnW85SbTJWId

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks