General

  • Target

    TransAgenda.7z

  • Size

    98KB

  • Sample

    240714-bnlqxascql

  • MD5

    80d38162566dd741aa1f49d8dff64f06

  • SHA1

    4bf98a19163cec8f30e55f5f51734dac6bf95416

  • SHA256

    2b322a7ca22c6db611c3f427462a2e93f8f7985ca2213d18ef266e66a8e46aed

  • SHA512

    01f95146d3cba4b6a18d341e0546b5101e2078ee93dba624a5deee2c77e56681c06690ddce491f7acf1c0e490dd8599c2650c721ac1f688220548d28fabdc732

  • SSDEEP

    1536:PzVEOxEdd7lmoaIi3dsNsRj0UtwHwsZncHo23omkTf63zFHKxXs/trfOy:PBEO8d7ltLitso0vcERWzFqhs/tx

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

174.60.140.164

Mutex

Xeno_rat_nd8912f

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    7707

  • startup_name

    TransAgenda

Targets

    • Target

      TransAgenda.exe

    • Size

      127KB

    • MD5

      8dbebef8a47ea96ceed4408641e195ce

    • SHA1

      b13a236bdf60de5fac38ab11344392eadb7462a9

    • SHA256

      2bee910afaec59b55af87e2056a52cc43d879a2582dc5d148bcf696ddbd0516d

    • SHA512

      9159cf5a19963d73d947cf17db303eb84353a0237b03bb61fc553b6945f3c670da79cc5185211a793effa191ef438f0ce3f1b894dde3983cc068adce0757540d

    • SSDEEP

      3072:9w+jqT91UbTkTxswif42DRk1u1F33bIWQD4agDUbjwAGy7:qW291UbuqfhdkY1F3rTQD4agwfwby

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks