General

  • Target

    WDSADW.exe

  • Size

    45KB

  • Sample

    240709-ryxh6azfkh

  • MD5

    5e435ffa70fc96fd6a76c44d81e28f61

  • SHA1

    0fc858abe6ed67c699ecee46e87f135ecbe23ea8

  • SHA256

    a12536e4dda988a7c6270bf8d83756d691f4f8b89d1665642e74d3e3535262c9

  • SHA512

    6b17049768e8949c4d9f8a942d248cff6c6851a9e48c46860c0400f47dd46ea6f5874ae1f9bb1c879786a78638b4347a72c6ced3c73bf391bb7392eda1c157c2

  • SSDEEP

    768:2dhO/poiiUcjlJIn7a3H9Xqk5nWEZ5SbTDaTuI7CPW5h:gw+jjgnUH9XqcnW85SbTuuIZ

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

performance-ha.gl.at.ply.gg:33365

Mutex

Wiiindowss Deffender

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    2137

  • startup_name

    Windows Defender

Targets

    • Target

      WDSADW.exe

    • Size

      45KB

    • MD5

      5e435ffa70fc96fd6a76c44d81e28f61

    • SHA1

      0fc858abe6ed67c699ecee46e87f135ecbe23ea8

    • SHA256

      a12536e4dda988a7c6270bf8d83756d691f4f8b89d1665642e74d3e3535262c9

    • SHA512

      6b17049768e8949c4d9f8a942d248cff6c6851a9e48c46860c0400f47dd46ea6f5874ae1f9bb1c879786a78638b4347a72c6ced3c73bf391bb7392eda1c157c2

    • SSDEEP

      768:2dhO/poiiUcjlJIn7a3H9Xqk5nWEZ5SbTDaTuI7CPW5h:gw+jjgnUH9XqcnW85SbTuuIZ

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks