General

  • Target

    GlucoseBootstrapper.exe

  • Size

    310KB

  • Sample

    240803-azqcssxanr

  • MD5

    42b5a7ab130d52ef5d1cdb8f1a62e70c

  • SHA1

    43b4275d2442fc2e352dc1890b0dfa031f6aec88

  • SHA256

    27bea02ba16a40be47d94547a9cad6dbc6b40111bbf7616c175cf81c83260a5e

  • SHA512

    1eee045c0d92e8e235694620ea53f379a6a87514b84a0783ff92c85187a51b6a03e7d839910a564e1f7f58d861be87597e3cef056e103877ff6067648dbf7979

  • SSDEEP

    6144:rW991UbxJWt5c2xE7orTkcikKfnvVREg8SSovnF6zeZm4wgXtMhSWJTz3A2Gatec:rOzw45W26CC

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    4444

  • startup_name

    antibyfron

Targets

    • Target

      GlucoseBootstrapper.exe

    • Size

      310KB

    • MD5

      42b5a7ab130d52ef5d1cdb8f1a62e70c

    • SHA1

      43b4275d2442fc2e352dc1890b0dfa031f6aec88

    • SHA256

      27bea02ba16a40be47d94547a9cad6dbc6b40111bbf7616c175cf81c83260a5e

    • SHA512

      1eee045c0d92e8e235694620ea53f379a6a87514b84a0783ff92c85187a51b6a03e7d839910a564e1f7f58d861be87597e3cef056e103877ff6067648dbf7979

    • SSDEEP

      6144:rW991UbxJWt5c2xE7orTkcikKfnvVREg8SSovnF6zeZm4wgXtMhSWJTz3A2Gatec:rOzw45W26CC

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks