General

  • Target

    ASDASD.exe

  • Size

    45KB

  • Sample

    240424-bcb3bsdc6z

  • MD5

    748bfff2a909d92412d8400e7a86dbda

  • SHA1

    77bdcf2b5232b3c3eb0b6d2525d6f140cd0a92b1

  • SHA256

    e62a6f77fab09529a64f2e5f356c514217ea88ec2dcacf8ad037ac7fc2fddea5

  • SHA512

    1b19d3e50ce090d7f181d74ccf94b8444f7bee76669dc199389a2a0ec46a9ca09f9884b466cb62d3dc75cdb07d47005ad724005b4f4b2fabd5a8998d543a663d

  • SSDEEP

    768:VdhO/poiiUcjlJInhwH9Xqk5nWEZ5SbTDaDWI7CPW5m:rw+jjgnqH9XqcnW85SbTSWIu

Malware Config

Extracted

Family

xenorat

C2

choice-certainly.gl.at.ply.gg

Mutex

xeno_42344554563443

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    24253

  • startup_name

    system

Targets

    • Target

      ASDASD.exe

    • Size

      45KB

    • MD5

      748bfff2a909d92412d8400e7a86dbda

    • SHA1

      77bdcf2b5232b3c3eb0b6d2525d6f140cd0a92b1

    • SHA256

      e62a6f77fab09529a64f2e5f356c514217ea88ec2dcacf8ad037ac7fc2fddea5

    • SHA512

      1b19d3e50ce090d7f181d74ccf94b8444f7bee76669dc199389a2a0ec46a9ca09f9884b466cb62d3dc75cdb07d47005ad724005b4f4b2fabd5a8998d543a663d

    • SSDEEP

      768:VdhO/poiiUcjlJInhwH9Xqk5nWEZ5SbTDaDWI7CPW5m:rw+jjgnqH9XqcnW85SbTSWIu

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks