General
-
Target
RegistryHelper.exe
-
Size
46KB
-
Sample
240402-q3nw5sca6v
-
MD5
d7916e968a167b3054cb3078debb1fc4
-
SHA1
35b69b95699451453715b8f6963b18c5909ee665
-
SHA256
8fc30212418d834f5072dea6843fac92a080d10c33fc2a108bdc0d1183dc3c90
-
SHA512
3a9bb21e887cc2a0d5d7ebd04698287100d66173cbe199537a2bc47a6f632da6e5f1db9f95597bb68836614d435da100f7196edc435eb2d97a04187d8bbc4487
-
SSDEEP
768:fdhO/poiiUcjlJIn3sPH9Xqk5nWEZ5SbTDanuI7CPW5S:Vw+jjgn8PH9XqcnW85SbT6uIa
Behavioral task
behavioral1
Sample
RegistryHelper.exe
Resource
win10-20240214-en
Behavioral task
behavioral2
Sample
RegistryHelper.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
xenorat
3.66.38.117
Xeno_rat_nd8912d
-
delay
5000
-
install_path
appdata
-
port
11671
-
startup_name
Microsoft Windows Core Process
Targets
-
-
Target
RegistryHelper.exe
-
Size
46KB
-
MD5
d7916e968a167b3054cb3078debb1fc4
-
SHA1
35b69b95699451453715b8f6963b18c5909ee665
-
SHA256
8fc30212418d834f5072dea6843fac92a080d10c33fc2a108bdc0d1183dc3c90
-
SHA512
3a9bb21e887cc2a0d5d7ebd04698287100d66173cbe199537a2bc47a6f632da6e5f1db9f95597bb68836614d435da100f7196edc435eb2d97a04187d8bbc4487
-
SSDEEP
768:fdhO/poiiUcjlJIn3sPH9Xqk5nWEZ5SbTDanuI7CPW5S:Vw+jjgn8PH9XqcnW85SbT6uIa
-
Modifies Installed Components in the registry
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1