General

  • Target

    9f72418108ed402001ade698829d98ab7a867d1ea481831181038f098e5262de

  • Size

    249KB

  • Sample

    240726-y59wdssepr

  • MD5

    84aa2c3d7f31b73042edc61094fd677b

  • SHA1

    594202fb465b80420362128affef4b82c5a6c6eb

  • SHA256

    9f72418108ed402001ade698829d98ab7a867d1ea481831181038f098e5262de

  • SHA512

    c7116d3929b3f184592c7886768ee3db66ea04c180a77148c93435a643efcf105de63e135e09ed93737a747190a3156f0e3ad0f841b04137cc6838e1cb76c926

  • SSDEEP

    6144:DfRQsStLEhDY0Vh29826tczDztg1YxKuJAIiyUBI:bYihDFq9RgGtg1YxKuJAIiyU6

Malware Config

Extracted

Family

xenorat

C2

45.66.231.63

Mutex

Holid_rat_nd8859g

Attributes
  • delay

    60400

  • install_path

    appdata

  • port

    1243

  • startup_name

    HDdisplay

Targets

    • Target

      9f72418108ed402001ade698829d98ab7a867d1ea481831181038f098e5262de

    • Size

      249KB

    • MD5

      84aa2c3d7f31b73042edc61094fd677b

    • SHA1

      594202fb465b80420362128affef4b82c5a6c6eb

    • SHA256

      9f72418108ed402001ade698829d98ab7a867d1ea481831181038f098e5262de

    • SHA512

      c7116d3929b3f184592c7886768ee3db66ea04c180a77148c93435a643efcf105de63e135e09ed93737a747190a3156f0e3ad0f841b04137cc6838e1cb76c926

    • SSDEEP

      6144:DfRQsStLEhDY0Vh29826tczDztg1YxKuJAIiyUBI:bYihDFq9RgGtg1YxKuJAIiyU6

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks