General

  • Target

    z.py

  • Size

    944B

  • Sample

    240407-jw61taha24

  • MD5

    53208bd6bf45b2bab3cd17d972b7bcc0

  • SHA1

    5b269abcb7f3ff5306517bc16bd0cdb9e4159837

  • SHA256

    7aa64aad2b06dfed71dca4bcd403d9fe8e1a6d12b10a05eee75d8c00afb1fe63

  • SHA512

    426398bff0cd9d34656cdede15b251ca1d5bf3a9b110cf35f7395f81bc4b2bda42e04667d008e2164d1c6709fd1ebfec95570211d55b1b5d93e8e74e3a13b236

Malware Config

Extracted

Family

xenorat

C2

6.tcp.ngrok.io

Mutex

fdsfdsfsdfsdfnd8912d

Attributes
  • delay

    1000

  • install_path

    appdata

  • port

    17147

  • startup_name

    Intel Processor ©

Targets

    • Target

      z.py

    • Size

      944B

    • MD5

      53208bd6bf45b2bab3cd17d972b7bcc0

    • SHA1

      5b269abcb7f3ff5306517bc16bd0cdb9e4159837

    • SHA256

      7aa64aad2b06dfed71dca4bcd403d9fe8e1a6d12b10a05eee75d8c00afb1fe63

    • SHA512

      426398bff0cd9d34656cdede15b251ca1d5bf3a9b110cf35f7395f81bc4b2bda42e04667d008e2164d1c6709fd1ebfec95570211d55b1b5d93e8e74e3a13b236

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks