General

  • Target

    123.exe

  • Size

    51KB

  • Sample

    240506-be5seseg92

  • MD5

    77e3b9502255f892008a3e3eee232d49

  • SHA1

    c16f3247485da1a917b95e99400dfb94884a7b5e

  • SHA256

    460ae6dfdb2391263df9590eb174220e246d78fdc1e483a92e09d164a454a627

  • SHA512

    936253af9294b975a3eba60b6a151892a0020b79c6df4ede4ce46d3d6b19383e59d6fbdbf2e5a00bd5508e8a0a13ce454206da5fe79e5df2108fb555f98b1e11

  • SSDEEP

    768:8oivdjHrddilbVauou79EoIkqhnByfOHf2BSkGu2yPo+LGZYebFDa8Y6RNSgNO+:wpHmVauo3g0yf5Dj6CSYebFZxf4+

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

t7867689retufyufgu

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    1234

  • startup_name

    nothingset

Targets

    • Target

      123.exe

    • Size

      51KB

    • MD5

      77e3b9502255f892008a3e3eee232d49

    • SHA1

      c16f3247485da1a917b95e99400dfb94884a7b5e

    • SHA256

      460ae6dfdb2391263df9590eb174220e246d78fdc1e483a92e09d164a454a627

    • SHA512

      936253af9294b975a3eba60b6a151892a0020b79c6df4ede4ce46d3d6b19383e59d6fbdbf2e5a00bd5508e8a0a13ce454206da5fe79e5df2108fb555f98b1e11

    • SSDEEP

      768:8oivdjHrddilbVauou79EoIkqhnByfOHf2BSkGu2yPo+LGZYebFDa8Y6RNSgNO+:wpHmVauo3g0yf5Dj6CSYebFZxf4+

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks