General

  • Target

    ab8f788e8f1419027d83a5089e0b85c0db66a539eabbad8797c6afa48af4350e.exe

  • Size

    243KB

  • Sample

    240601-b5tg3seb76

  • MD5

    cb5111a3eed8836de9ca0fac07b027eb

  • SHA1

    e7623f95f9d19ed2cbbee4a869469db89fdc5559

  • SHA256

    ab8f788e8f1419027d83a5089e0b85c0db66a539eabbad8797c6afa48af4350e

  • SHA512

    2c872aa68c2809d93ee10ec40e03c2c7fe83f0566389de73db42dd060b032118554e522514ea9353646e33e7a97f044957822ee2f8d40afadf22094f9674af01

  • SSDEEP

    6144:OAGwtabqGlzYyMCBYIhxpIZKZhXdpvbZGVMpzqArttI:OAraeGBYyzppIZKZ1dpTZpOArtW

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

dns.dobiamfollollc.online

Mutex

Jolid_rat_nd8889g

Attributes
  • delay

    61000

  • install_path

    appdata

  • port

    1284

  • startup_name

    hns

Targets

    • Target

      ab8f788e8f1419027d83a5089e0b85c0db66a539eabbad8797c6afa48af4350e.exe

    • Size

      243KB

    • MD5

      cb5111a3eed8836de9ca0fac07b027eb

    • SHA1

      e7623f95f9d19ed2cbbee4a869469db89fdc5559

    • SHA256

      ab8f788e8f1419027d83a5089e0b85c0db66a539eabbad8797c6afa48af4350e

    • SHA512

      2c872aa68c2809d93ee10ec40e03c2c7fe83f0566389de73db42dd060b032118554e522514ea9353646e33e7a97f044957822ee2f8d40afadf22094f9674af01

    • SSDEEP

      6144:OAGwtabqGlzYyMCBYIhxpIZKZhXdpvbZGVMpzqArttI:OAraeGBYyzppIZKZ1dpTZpOArtW

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Detects executables packed with ConfuserEx Mod

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks