General

  • Target

    3442baf899fcdef2f78165a69ad2c10a77576d0b0bae94f15a41341b01ad32b7

  • Size

    243KB

  • Sample

    240514-y4y3hafb87

  • MD5

    0e9b2c5f8304300edb087bc435bd0ae2

  • SHA1

    05818c31d64d6766f7d641cdac52a7782c7af31f

  • SHA256

    3442baf899fcdef2f78165a69ad2c10a77576d0b0bae94f15a41341b01ad32b7

  • SHA512

    cd25dd9493eb46ea4b76a46e227894b20146c6cb2ad432a6b163c1dcc602be16b0c941ca06e1a5685ec8e1bdb186b07af6bf37c07e9f0a2a015c28bbb1ccebad

  • SSDEEP

    6144:6/uCoiIRe9955vZCfIuCNVj5D8Rv7cmlBNCdG1O3ppufUsTI:6/uCo9eP55vZoWv5AVlBNCdG1O3ppufW

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

dns.requimacofradian.site

Mutex

Xeno_rat_nd8818g

Attributes
  • delay

    60000

  • install_path

    appdata

  • port

    1243

  • startup_name

    uic

Targets

    • Target

      3442baf899fcdef2f78165a69ad2c10a77576d0b0bae94f15a41341b01ad32b7

    • Size

      243KB

    • MD5

      0e9b2c5f8304300edb087bc435bd0ae2

    • SHA1

      05818c31d64d6766f7d641cdac52a7782c7af31f

    • SHA256

      3442baf899fcdef2f78165a69ad2c10a77576d0b0bae94f15a41341b01ad32b7

    • SHA512

      cd25dd9493eb46ea4b76a46e227894b20146c6cb2ad432a6b163c1dcc602be16b0c941ca06e1a5685ec8e1bdb186b07af6bf37c07e9f0a2a015c28bbb1ccebad

    • SSDEEP

      6144:6/uCoiIRe9955vZCfIuCNVj5D8Rv7cmlBNCdG1O3ppufUsTI:6/uCo9eP55vZoWv5AVlBNCdG1O3ppufW

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Detects executables packed with ConfuserEx Mod

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks