General

  • Target

    6621fcab4de5fab7eac4d8d03c87f233.bin

  • Size

    181KB

  • Sample

    240704-vd4zaa1gqg

  • MD5

    c416619cafdb4022447b64c379a7e1f8

  • SHA1

    0e9edfab6d4c9dc35d61536536c4a149ca3e7182

  • SHA256

    d43587c87eacc8e66d9108b021859c515486308011a1f9eea7c3f0bc42f018f2

  • SHA512

    7819a742dfb43c537df17206584523d68928a0c47b8bcf479fcf75ef838715f9a7b98cefa70facb8ecc5d1dc4510ed72a7909e28500515c8cafa5db913a8cbf5

  • SSDEEP

    3072:fdWlprkpsrpPsLRgW9orzHQM85jXtn264XHCH7a+v8v9UDdsfxgMpu:gLOVwzr85jXtnnH+6dsCt

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

91.92.248.167

Mutex

Wolid_rat_nd8859g

Attributes
  • delay

    60000

  • install_path

    appdata

  • port

    1280

  • startup_name

    cms

Targets

    • Target

      ac781121f63db7be4e5c79ea106118ce2c7a06f0abef01be3e54ff77351691e2.exe

    • Size

      221KB

    • MD5

      6621fcab4de5fab7eac4d8d03c87f233

    • SHA1

      70dd77e26e803239877b30439eb123454bc137cc

    • SHA256

      ac781121f63db7be4e5c79ea106118ce2c7a06f0abef01be3e54ff77351691e2

    • SHA512

      d132d2399c65b6b0083f7172c04d4708b28b3deceb93fd0c5dfc5bcfdfd9ee459c5b46853d176e08e99a2a8842945e6cd396e4137fac430c67abea388e83789c

    • SSDEEP

      6144:WdwDpybdvNg134Gnq2YZstYaGaqjWq9441D/Kv+I:/cE134GiZ4Ya7mWq9441D/Kvj

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks