General

  • Target

    NigNig.exe

  • Size

    51KB

  • Sample

    240430-wbas4adg63

  • MD5

    aaccbc915a130776ef9a56718d85fbc9

  • SHA1

    ed7e818ee468b46115c733df5add3ae93d176ed9

  • SHA256

    64feddde139d40b6a7194ce93d29f4b9d38598d573f3f51b338938506dde1235

  • SHA512

    7461353ab1af04ea6fcdc97a469ebcc64490f2d09ec4031e6658436b07c1dea07da639ea140f9b3d62b4715e1566f1d1e7e6d6d917281f0687de874390554134

  • SSDEEP

    768:5ivdjHrddilbVauou79EoKsmqEPBZ6HLBSkGu2yPo+LGZYebFDa9k6RNSgNOcV:CpHmVauo3Jn/ZADj6CSYebFwlf4g

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

teaching-wireless.gl.at.ply.gg

Mutex

nignig_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    39289

  • startup_name

    discord

Targets

    • Target

      NigNig.exe

    • Size

      51KB

    • MD5

      aaccbc915a130776ef9a56718d85fbc9

    • SHA1

      ed7e818ee468b46115c733df5add3ae93d176ed9

    • SHA256

      64feddde139d40b6a7194ce93d29f4b9d38598d573f3f51b338938506dde1235

    • SHA512

      7461353ab1af04ea6fcdc97a469ebcc64490f2d09ec4031e6658436b07c1dea07da639ea140f9b3d62b4715e1566f1d1e7e6d6d917281f0687de874390554134

    • SSDEEP

      768:5ivdjHrddilbVauou79EoKsmqEPBZ6HLBSkGu2yPo+LGZYebFDa9k6RNSgNOcV:CpHmVauo3Jn/ZADj6CSYebFwlf4g

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks