General

  • Target

    NovaDebug.exe

  • Size

    45KB

  • Sample

    240718-xmj2kssaln

  • MD5

    09e75c0a0f5f0e839d23ac80a6b38d56

  • SHA1

    d36e6d2f7e59f451cae5d9b18fbe0c14bf73f134

  • SHA256

    e14421ff6b1d53b35cf713c08e3025c8db7f8a55b7e40b5e8c787bb6bf441030

  • SHA512

    bd1a267b2d2e74d5a7da323dfdd77382458722af89cbc75d8a6ada9e7125bb0118458f2a5b7b17a31d05b527a9edcf43428c057bddee3498621869bbdaa3365f

  • SSDEEP

    768:9dhO/poiiUcjlJInIzH9Xqk5nWEZ5SbTDaLWI7CPW5P:zw+jjgnKH9XqcnW85SbT6WI3

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    1294

  • startup_name

    NovaDebug

Targets

    • Target

      NovaDebug.exe

    • Size

      45KB

    • MD5

      09e75c0a0f5f0e839d23ac80a6b38d56

    • SHA1

      d36e6d2f7e59f451cae5d9b18fbe0c14bf73f134

    • SHA256

      e14421ff6b1d53b35cf713c08e3025c8db7f8a55b7e40b5e8c787bb6bf441030

    • SHA512

      bd1a267b2d2e74d5a7da323dfdd77382458722af89cbc75d8a6ada9e7125bb0118458f2a5b7b17a31d05b527a9edcf43428c057bddee3498621869bbdaa3365f

    • SSDEEP

      768:9dhO/poiiUcjlJInIzH9Xqk5nWEZ5SbTDaLWI7CPW5P:zw+jjgnKH9XqcnW85SbT6WI3

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks