General

  • Target

    231414214.exe

  • Size

    46KB

  • Sample

    240707-wwggdawejr

  • MD5

    2d4f8f0121e08ee51e3d13ba676029d2

  • SHA1

    b415375c857ad193c48d814d002ddf8f69f56f6a

  • SHA256

    ec87515958ea0e140ac984e1dd2e80d51b0124548cfc0182f0329e195f3cef99

  • SHA512

    d5844ca8aedea685b83e8f01ebd603bc41e9cd50b8c5dc917ca6e6e6c8cacb59df258dfbf96a7e9e9d4733261c6df2801de7f716e5c37e7471368c353526b700

  • SSDEEP

    768:0dhO/poiiUcjlJInGr6BH9Xqk5nWEZ5SbTDawuI7CPW5j:Ow+jjgnrH9XqcnW85SbTNuIb

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

192.168.1.254

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4444

  • startup_name

    Windows Defender

Targets

    • Target

      231414214.exe

    • Size

      46KB

    • MD5

      2d4f8f0121e08ee51e3d13ba676029d2

    • SHA1

      b415375c857ad193c48d814d002ddf8f69f56f6a

    • SHA256

      ec87515958ea0e140ac984e1dd2e80d51b0124548cfc0182f0329e195f3cef99

    • SHA512

      d5844ca8aedea685b83e8f01ebd603bc41e9cd50b8c5dc917ca6e6e6c8cacb59df258dfbf96a7e9e9d4733261c6df2801de7f716e5c37e7471368c353526b700

    • SSDEEP

      768:0dhO/poiiUcjlJInGr6BH9Xqk5nWEZ5SbTDawuI7CPW5j:Ow+jjgnrH9XqcnW85SbTNuIb

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks