General

  • Target

    d5b5e661f87559ceb5192f9e7c01f357c2762d26daff88fe308bb1141eaf2e40

  • Size

    581KB

  • Sample

    240704-vx2m9szeqn

  • MD5

    bdee83cc25a6028993abd42ac06db4e4

  • SHA1

    3f8effd698102f35fba71d784ee9737b3fad31b9

  • SHA256

    d5b5e661f87559ceb5192f9e7c01f357c2762d26daff88fe308bb1141eaf2e40

  • SHA512

    539d2f68f712cf190e693a916d3ba1daf3e49160752a2197a992ce1e3587dfc610072375b6bf2c47110b4af02a5893b2fa1eae58eb9b060c771ab04572e408bb

  • SSDEEP

    12288:KUZRZIAMX9GiNXpdwSl+p8YBCEdb09WAlmQ7S2KG8jQ2Ihi:K2RePZpl+IEd4t22KGmZ

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

xenorat

C2

91.92.248.167

Mutex

Wolid_rat_nd8889g

Attributes
  • delay

    60000

  • install_path

    appdata

  • port

    1279

  • startup_name

    qns

Targets

    • Target

      8eaf377f8fc59bb93ada3e1f94571ebbbc3d3732475c86239ee72e4c1f2f31c7.xll

    • Size

      819KB

    • MD5

      5475ac0337614b9651483ca83628c38f

    • SHA1

      d03d0806bb24207780b441a090e3ff9e9d263929

    • SHA256

      8eaf377f8fc59bb93ada3e1f94571ebbbc3d3732475c86239ee72e4c1f2f31c7

    • SHA512

      d4d7d417fbadb98ac94e728c994b4ae7abc505632a1eb79d8f8193c71daa7bbbf2aa709713ec94ffa9b645dcf02b06907cd3fe1538840dfc22411c229bbcdb8c

    • SSDEEP

      12288:xG1N4HkcgMsiOd58bzbBSre6Q0uqZzD1reWabd/dbNZEEx/DLn0vkYHipwyA:xoOOMX1K+QHT+d9NZdxYHip

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks