General

  • Target

    again.exe

  • Size

    45KB

  • Sample

    240613-nwnaxsxckg

  • MD5

    ca35207d59bcace81078c18fa25228d7

  • SHA1

    3dac0363c4d374fb963255eb07f7810ce685d1b3

  • SHA256

    963473049e8f0f6074370ff00418183b0fd68ceab0a028876a78625725f22f93

  • SHA512

    184f7e42d0f310dfaee8ce632bce5cfbf0d7bca5897f933200e6dcf15b4985f98e3d034999f49e9919daaa9529ae49692518b2bac10aa2c353debbdbed289f40

  • SSDEEP

    768:tdhO/poiiUcjlJInRTwH9Xqk5nWEZ5SbTDaRWI7CPW5s:jw+jjgnCH9XqcnW85SbTgWI0

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

10.129.120.194

Mutex

skibidi_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4782

  • startup_name

    skibidi

Targets

    • Target

      again.exe

    • Size

      45KB

    • MD5

      ca35207d59bcace81078c18fa25228d7

    • SHA1

      3dac0363c4d374fb963255eb07f7810ce685d1b3

    • SHA256

      963473049e8f0f6074370ff00418183b0fd68ceab0a028876a78625725f22f93

    • SHA512

      184f7e42d0f310dfaee8ce632bce5cfbf0d7bca5897f933200e6dcf15b4985f98e3d034999f49e9919daaa9529ae49692518b2bac10aa2c353debbdbed289f40

    • SSDEEP

      768:tdhO/poiiUcjlJInRTwH9Xqk5nWEZ5SbTDaRWI7CPW5s:jw+jjgnCH9XqcnW85SbTgWI0

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks