General

  • Target

    NyroxBot.rar

  • Size

    39.2MB

  • Sample

    240404-vaqx9acg8v

  • MD5

    4680919a5c80a76baa988cde6e718c08

  • SHA1

    aa4b67d15333fab80f42fc6097e91ff6c503755d

  • SHA256

    bb15956519e69b0e9627259b1254625b4c446b70aaa4e356de2ec58667ce3b25

  • SHA512

    de1fb10354c8ed15dc8f0fd18902d77fdbd70686706447736e20694f1d0c486e6e1d83f1479ea9425e7237fb278d96bc9fc62ebb361adf81cd14dd5d949177e5

  • SSDEEP

    786432:EZr7nr4QoOMcIOLlgkWfDxb4S99Q44cSgrsuYuAGQF5bpWy+sl:E+7OMcte/fDi4WwY/FBp1+sl

Malware Config

Extracted

Family

xenorat

C2

6.tcp.ngrok.io

Mutex

fdsfdsfsdfsdfnd8912d

Attributes
  • delay

    1000

  • install_path

    appdata

  • port

    17147

  • startup_name

    Intel Processor ©

Targets

    • Target

      NyroxMain/NyroxV1.2.EXE

    • Size

      51.5MB

    • MD5

      631c3999aa69ec16dd1b76e0d58480c4

    • SHA1

      e7eb0455dd3ce9054df951e97074ccae1e04b3c0

    • SHA256

      28a4844156b5ae9212358fe80e2ec69bfc2b133706aba6b4faa39ac75358b4bc

    • SHA512

      d03c52e7b2177f215d39d1aba571fcfaa54de9046f619e972785a88aaa1aacad39ceed1d7fc90d66cade623555412ed7785dd08410641e23d1f0099f3a36bc2e

    • SSDEEP

      1572864:w+TrPZOWnH799na/bT3rRBcnIIh1hS1mGauoDcB:wkCf3r0ThW4

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      NyroxMain/assets.dll

    • Size

      5.1MB

    • MD5

      773b3b72481fd8ef9b62b5ef0fe8040a

    • SHA1

      a42cbc7aab88689e834c158b24af8722586cf1b4

    • SHA256

      7f93fef11819a9f4b8edd342a1c2d3dbab25698ed75f9713ee1167fa2f852331

    • SHA512

      db7d29100060afc909cbf20bcd6d9c02fc0b29d8ee32606e2d6cf18270484f2b46853cda0b495a85cc7a2e3ae4536030a25216f101dceabf2f972e3375208c38

    • SSDEEP

      768:+UI7yUI7yUI7yUI7yUI7yUI7yUI7yUI7yUI7yUI7yUI7yUI7yUI7yUI7yUI7yUIn:3

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks