General

  • Target

    123.exe

  • Size

    45KB

  • Sample

    240513-xkrcwaae35

  • MD5

    fd3fa42906bc5b6a8c5e797431d3e9f1

  • SHA1

    8f21e90966b9682640ae12d89b7485f18fc960c5

  • SHA256

    8a9c7963d74a81dbbdd82f50e0ef9014777474c9ff55bc26bbf64681bb571cfb

  • SHA512

    b04e17457c28d791717751626f3e88872fc4c4792e6da90d8e008817afc6c3b7ef8bd2afc09ecd0c951d74f8d2922d1eaa190ae3c3d166dd6cf93338c70947a1

  • SSDEEP

    768:BdhO/poiiUcjlJInLr6BH9Xqk5nWEZ5SbTDaUuI7CPW5Q:/w+jjgncH9XqcnW85SbThuI4

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

7.tcp.eu.ngrok.io

Mutex

radnom123_34X41

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    10543

  • startup_name

    window system

Targets

    • Target

      123.exe

    • Size

      45KB

    • MD5

      fd3fa42906bc5b6a8c5e797431d3e9f1

    • SHA1

      8f21e90966b9682640ae12d89b7485f18fc960c5

    • SHA256

      8a9c7963d74a81dbbdd82f50e0ef9014777474c9ff55bc26bbf64681bb571cfb

    • SHA512

      b04e17457c28d791717751626f3e88872fc4c4792e6da90d8e008817afc6c3b7ef8bd2afc09ecd0c951d74f8d2922d1eaa190ae3c3d166dd6cf93338c70947a1

    • SSDEEP

      768:BdhO/poiiUcjlJInLr6BH9Xqk5nWEZ5SbTDaUuI7CPW5Q:/w+jjgncH9XqcnW85SbThuI4

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks