General

  • Target

    3914de8aa3ecf3b70f7771655b620180N.exe

  • Size

    44KB

  • Sample

    240726-amlh3sthmq

  • MD5

    3914de8aa3ecf3b70f7771655b620180

  • SHA1

    948c7684983bac80a39b9557dd48d89fb9b6e843

  • SHA256

    27c30e6621e5fec718995b0360bd72284c0498da65e4229dbfbf3316d4548c14

  • SHA512

    e594c206124c211838d3fc68043765e8506b1141369ca4d2a1991ddc2c25adf8b8facd6a4b3de2c3aeb133f754aa4762b0a5669fc5c4fe0b087aaff211c5e24e

  • SSDEEP

    768:kKpu9Tv4A4QfJkwINr8I0SeM5MbRFywB/ZXD5DtZ9bEUWAfAFkY:hc9z4rQfwNr8QeM2biwBx5Dz9bEpAfol

Malware Config

Targets

    • Target

      3914de8aa3ecf3b70f7771655b620180N.exe

    • Size

      44KB

    • MD5

      3914de8aa3ecf3b70f7771655b620180

    • SHA1

      948c7684983bac80a39b9557dd48d89fb9b6e843

    • SHA256

      27c30e6621e5fec718995b0360bd72284c0498da65e4229dbfbf3316d4548c14

    • SHA512

      e594c206124c211838d3fc68043765e8506b1141369ca4d2a1991ddc2c25adf8b8facd6a4b3de2c3aeb133f754aa4762b0a5669fc5c4fe0b087aaff211c5e24e

    • SSDEEP

      768:kKpu9Tv4A4QfJkwINr8I0SeM5MbRFywB/ZXD5DtZ9bEUWAfAFkY:hc9z4rQfwNr8QeM2biwBx5Dz9bEpAfol

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks