General

  • Target

    tmp

  • Size

    50KB

  • Sample

    240423-lpap5sfc2v

  • MD5

    90e548580d8ca36734fc3819c112fa47

  • SHA1

    e97a90b53c364d2d404c8341a6726f598873eca2

  • SHA256

    33315fc72bfed46fa5e4e6181ff12b009f96bed17bc905804b33fd10eff6bc6a

  • SHA512

    bf4fed772da8a0087f16b91b38388409e68495c1d9bb1b31dd3df120ae36ba9ab59e5cc5e5d2e57277059651c19df1d906afbc0451491d5262993567c357c627

  • SSDEEP

    768:1dhO/poiiUcjlJInKwH9Xqk5nWEZ5SbTDa0pWI7CPW5Sn:Lw+jjgnTH9XqcnW85SbTTpWII

Malware Config

Extracted

Family

xenorat

C2

94.156.67.9

Mutex

222ef5be-4d8a-4b59-8c56-f49f63726537

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4456

  • startup_name

    svhcost

Targets

    • Target

      tmp

    • Size

      50KB

    • MD5

      90e548580d8ca36734fc3819c112fa47

    • SHA1

      e97a90b53c364d2d404c8341a6726f598873eca2

    • SHA256

      33315fc72bfed46fa5e4e6181ff12b009f96bed17bc905804b33fd10eff6bc6a

    • SHA512

      bf4fed772da8a0087f16b91b38388409e68495c1d9bb1b31dd3df120ae36ba9ab59e5cc5e5d2e57277059651c19df1d906afbc0451491d5262993567c357c627

    • SSDEEP

      768:1dhO/poiiUcjlJInKwH9Xqk5nWEZ5SbTDa0pWI7CPW5Sn:Lw+jjgnTH9XqcnW85SbTTpWII

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks