General

  • Target

    norizzy.exe

  • Size

    45KB

  • Sample

    240531-2k4enaga81

  • MD5

    a39dade930f828d59e4e86633986356c

  • SHA1

    956f47e3bd9bc8398acb93a5b62b66e5ae8475ff

  • SHA256

    47556f2d38004c59b08305afb3f8faaefd39d9885c3d28db13c2df51de61eed5

  • SHA512

    99096d1c6b8b0e55d47c1647c5edaae4582e8e4c1211b6ffe76aef299a5b52b5bf2791c5261e8fb86a2d71f4214d7d473202c178d66b61c3830c17ff31f20218

  • SSDEEP

    768:5dhO/poiiUcjlJInOsPH9Xqk5nWEZ5SbTDaLluI7CPW5o:3w+jjgnZPH9XqcnW85SbTEuIg

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

character-acquisitions.gl.at.ply.gg

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    36301

  • startup_name

    gggggg

Targets

    • Target

      norizzy.exe

    • Size

      45KB

    • MD5

      a39dade930f828d59e4e86633986356c

    • SHA1

      956f47e3bd9bc8398acb93a5b62b66e5ae8475ff

    • SHA256

      47556f2d38004c59b08305afb3f8faaefd39d9885c3d28db13c2df51de61eed5

    • SHA512

      99096d1c6b8b0e55d47c1647c5edaae4582e8e4c1211b6ffe76aef299a5b52b5bf2791c5261e8fb86a2d71f4214d7d473202c178d66b61c3830c17ff31f20218

    • SSDEEP

      768:5dhO/poiiUcjlJInOsPH9Xqk5nWEZ5SbTDaLluI7CPW5o:3w+jjgnZPH9XqcnW85SbTEuIg

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks