General

  • Target

    6621fcab4de5fab7eac4d8d03c87f233.exe

  • Size

    221KB

  • Sample

    240704-ven98azarn

  • MD5

    6621fcab4de5fab7eac4d8d03c87f233

  • SHA1

    70dd77e26e803239877b30439eb123454bc137cc

  • SHA256

    ac781121f63db7be4e5c79ea106118ce2c7a06f0abef01be3e54ff77351691e2

  • SHA512

    d132d2399c65b6b0083f7172c04d4708b28b3deceb93fd0c5dfc5bcfdfd9ee459c5b46853d176e08e99a2a8842945e6cd396e4137fac430c67abea388e83789c

  • SSDEEP

    6144:WdwDpybdvNg134Gnq2YZstYaGaqjWq9441D/Kv+I:/cE134GiZ4Ya7mWq9441D/Kvj

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

91.92.248.167

Mutex

Wolid_rat_nd8859g

Attributes
  • delay

    60000

  • install_path

    appdata

  • port

    1280

  • startup_name

    cms

Targets

    • Target

      6621fcab4de5fab7eac4d8d03c87f233.exe

    • Size

      221KB

    • MD5

      6621fcab4de5fab7eac4d8d03c87f233

    • SHA1

      70dd77e26e803239877b30439eb123454bc137cc

    • SHA256

      ac781121f63db7be4e5c79ea106118ce2c7a06f0abef01be3e54ff77351691e2

    • SHA512

      d132d2399c65b6b0083f7172c04d4708b28b3deceb93fd0c5dfc5bcfdfd9ee459c5b46853d176e08e99a2a8842945e6cd396e4137fac430c67abea388e83789c

    • SSDEEP

      6144:WdwDpybdvNg134Gnq2YZstYaGaqjWq9441D/Kv+I:/cE134GiZ4Ya7mWq9441D/Kvj

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks