General

  • Target

    249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe

  • Size

    240KB

  • Sample

    240705-teh8jatdre

  • MD5

    cc5b6e9deec470d26e074859ca794aca

  • SHA1

    0cf0d409f644c3712299b0c91ea249537d51ff45

  • SHA256

    249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99

  • SHA512

    bd97b5d8ef82d68dc1d0a2162375a6515b927be95e99dd6a4a725172da885eff4e162d80ad4bbac30b579d6e9fa3d6d73f452716239d61b7c01803afa653959d

  • SSDEEP

    6144:suCZay34VffBhW5JDo4mLDiBRnB7/Z8rnA++gQj79toI:JCF0f/O+4m6vkrnA++gQj79T

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

91.92.248.167

Mutex

Dolid_rat_nd8859g

Attributes
  • delay

    60000

  • install_path

    appdata

  • port

    1280

  • startup_name

    dms

Targets

    • Target

      249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99.exe

    • Size

      240KB

    • MD5

      cc5b6e9deec470d26e074859ca794aca

    • SHA1

      0cf0d409f644c3712299b0c91ea249537d51ff45

    • SHA256

      249ff1abee706220f65aa47ef1c839a44b54979466ac531231858c6cf8e50e99

    • SHA512

      bd97b5d8ef82d68dc1d0a2162375a6515b927be95e99dd6a4a725172da885eff4e162d80ad4bbac30b579d6e9fa3d6d73f452716239d61b7c01803afa653959d

    • SSDEEP

      6144:suCZay34VffBhW5JDo4mLDiBRnB7/Z8rnA++gQj79toI:JCF0f/O+4m6vkrnA++gQj79T

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks