General

  • Target

    gfsdf.exe

  • Size

    45KB

  • Sample

    240430-d2zk2abh2v

  • MD5

    3176e2db56db90d2093a4926cfc6bace

  • SHA1

    5bb695f47fa3e9bce51a2612d36837057db5ac1c

  • SHA256

    ac8ff41c341ca06162fbe975cf2bbad0673b9cb15c9077adf98650580c0d26b3

  • SHA512

    1f8dbdd2a33fcbccc2243fca1674518c8f98abf8460068ad7287f13e4e299e8b9ac5a0a7ca5ed17f4c44ca8d51ca793f8e491e8520b8bbd4638f3492bfc84be4

  • SSDEEP

    768:1dhO/poiiUcjlJIn0qH9Xqk5nWEZ5SbTDaSWI7CPW5q:Lw+jjgn/H9XqcnW85SbTjWIC

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

centre-clan.gl.at.ply.gg

Mutex

nignig_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    40354

  • startup_name

    discord

Targets

    • Target

      gfsdf.exe

    • Size

      45KB

    • MD5

      3176e2db56db90d2093a4926cfc6bace

    • SHA1

      5bb695f47fa3e9bce51a2612d36837057db5ac1c

    • SHA256

      ac8ff41c341ca06162fbe975cf2bbad0673b9cb15c9077adf98650580c0d26b3

    • SHA512

      1f8dbdd2a33fcbccc2243fca1674518c8f98abf8460068ad7287f13e4e299e8b9ac5a0a7ca5ed17f4c44ca8d51ca793f8e491e8520b8bbd4638f3492bfc84be4

    • SSDEEP

      768:1dhO/poiiUcjlJIn0qH9Xqk5nWEZ5SbTDaSWI7CPW5q:Lw+jjgn/H9XqcnW85SbTjWIC

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks