General

  • Target

    2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch

  • Size

    5.4MB

  • Sample

    240515-cat1ssbe4s

  • MD5

    5b9731dc85c4c73f4fcc491a17d57fcd

  • SHA1

    24699fcc2df32502e959a6f918190eb1b9241319

  • SHA256

    a704f907107e0208de4b35e93e6d435dc54fd8f28c87c84250502a2dfa5b5738

  • SHA512

    1d0261bc229c2e8ebe3372ef6abcaf9fbe96162d8853c0b9f3c36ab77ebf3d844924d1c5571bd5b4017e227f01ca05985d6b48c4e23d41d59903d0e5ed0502b8

  • SSDEEP

    49152:xcIa7C33IJszhP0o/eiY9iCl3miEcUD9HTxTju5EFhoRvE9Zz:qa33IGNPaiCUu0duEFSR

Malware Config

Extracted

Family

xenorat

C2

69.46.15.141

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4444

  • startup_name

    nothingset

Targets

    • Target

      2024-05-15_5b9731dc85c4c73f4fcc491a17d57fcd_ngrbot_snatch

    • Size

      5.4MB

    • MD5

      5b9731dc85c4c73f4fcc491a17d57fcd

    • SHA1

      24699fcc2df32502e959a6f918190eb1b9241319

    • SHA256

      a704f907107e0208de4b35e93e6d435dc54fd8f28c87c84250502a2dfa5b5738

    • SHA512

      1d0261bc229c2e8ebe3372ef6abcaf9fbe96162d8853c0b9f3c36ab77ebf3d844924d1c5571bd5b4017e227f01ca05985d6b48c4e23d41d59903d0e5ed0502b8

    • SSDEEP

      49152:xcIa7C33IJszhP0o/eiY9iCl3miEcUD9HTxTju5EFhoRvE9Zz:qa33IGNPaiCUu0duEFSR

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Scheduled Task/Job

1
T1053

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Scheduled Task/Job

1
T1053

Defense Evasion

Impair Defenses

1
T1562

Disable or Modify System Firewall

1
T1562.004

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks