General

  • Target

    SteamUDP.exe

  • Size

    112KB

  • Sample

    240703-n68plsseqe

  • MD5

    c98e2b56dcd5a3f3aaa0abb0278755b2

  • SHA1

    b5999f967c235e3f7147a5fabdf8429bee5a36ff

  • SHA256

    903ad14b353ea5efc0dfb4cb91421a17a245aa0b5e45b9ff6653edd2a881df7a

  • SHA512

    0c7a4db2e66e601cf0a23392991ddde9d520cfb07d596323a8469c92bddb000e395d9af929d335cc17443412679b7f40224c298190353a9cf8b46dfda4f27153

  • SSDEEP

    1536:vw+jjgnJ2H9XqcnW85SbThuIkKuZ+8uZ3nV5XS65mkrPZ58kzQ+e+e+g:vw+jqJ491UbTh3h7J7M+e+e+g

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

37.120.141.155

Mutex

SteamUDP_FULL3

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    22914

  • startup_name

    SteamUDP

Targets

    • Target

      SteamUDP.exe

    • Size

      112KB

    • MD5

      c98e2b56dcd5a3f3aaa0abb0278755b2

    • SHA1

      b5999f967c235e3f7147a5fabdf8429bee5a36ff

    • SHA256

      903ad14b353ea5efc0dfb4cb91421a17a245aa0b5e45b9ff6653edd2a881df7a

    • SHA512

      0c7a4db2e66e601cf0a23392991ddde9d520cfb07d596323a8469c92bddb000e395d9af929d335cc17443412679b7f40224c298190353a9cf8b46dfda4f27153

    • SSDEEP

      1536:vw+jjgnJ2H9XqcnW85SbThuIkKuZ+8uZ3nV5XS65mkrPZ58kzQ+e+e+g:vw+jqJ491UbTh3h7J7M+e+e+g

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks