General

  • Target

    injector.exe

  • Size

    45KB

  • Sample

    240415-wnsvfafa3t

  • MD5

    326de0250397bbb4dc3d6c59d86ff270

  • SHA1

    54c382e15430944fb2f989c674691154530cf70e

  • SHA256

    d9509675b5cc135df8819982448ee4713180c6f7c0fdc0c92af21200b5533039

  • SHA512

    29eec3172941cba583f48ac3051dd88195cd70f659b319f9fda9e4afd6780b402b9391c4750dd929c90bb0a775a5236cc3575927140a7dedbdeb2c62d3f18699

  • SSDEEP

    768:pdhO/poiiUcjlJInxCLue9H9Xqk5nWEZ5SbTDaJWI7CPW5J:nw+jjgn8ye9H9XqcnW85SbTgWIx

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

fn_external.exe

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4444

  • startup_name

    fn_exrternal.exe

Targets

    • Target

      injector.exe

    • Size

      45KB

    • MD5

      326de0250397bbb4dc3d6c59d86ff270

    • SHA1

      54c382e15430944fb2f989c674691154530cf70e

    • SHA256

      d9509675b5cc135df8819982448ee4713180c6f7c0fdc0c92af21200b5533039

    • SHA512

      29eec3172941cba583f48ac3051dd88195cd70f659b319f9fda9e4afd6780b402b9391c4750dd929c90bb0a775a5236cc3575927140a7dedbdeb2c62d3f18699

    • SSDEEP

      768:pdhO/poiiUcjlJInxCLue9H9Xqk5nWEZ5SbTDaJWI7CPW5J:nw+jjgn8ye9H9XqcnW85SbTgWIx

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks