Resubmissions

10-08-2024 04:36

240810-e8ckhswdmk 10

22-07-2024 16:52

240722-vdflpaxcrg 10

General

  • Target

    Spoofer.exe

  • Size

    46KB

  • Sample

    240810-e8ckhswdmk

  • MD5

    8462795ada587c3bccdb59c2f48e5bfe

  • SHA1

    ae155c1d78ba4adfbfe5aa022a2deb725fc1dc9a

  • SHA256

    b676dadc109d8b1322111502103a943073180b3daa78a04637448b148730736d

  • SHA512

    7860b4447fe17084e0225a052d9712b3fe332cdd6e4f59d1057e4613c07c416f1cfe36c1a49bf0f631a4289ac49fb24518c63fb03ed7a6df2af832361e764ff6

  • SSDEEP

    768:qdhO/poiiUcjlJInfFH9Xqk5nWEZ5SbTDa/WI7CPW5w:Mw+jjgnNH9XqcnW85SbT+WII

Malware Config

Extracted

Family

xenorat

C2

62.133.174.224

Mutex

RuntimeBroker

Attributes
  • delay

    500

  • install_path

    appdata

  • port

    3056

  • startup_name

    RuntimeBroker

Targets

    • Target

      Spoofer.exe

    • Size

      46KB

    • MD5

      8462795ada587c3bccdb59c2f48e5bfe

    • SHA1

      ae155c1d78ba4adfbfe5aa022a2deb725fc1dc9a

    • SHA256

      b676dadc109d8b1322111502103a943073180b3daa78a04637448b148730736d

    • SHA512

      7860b4447fe17084e0225a052d9712b3fe332cdd6e4f59d1057e4613c07c416f1cfe36c1a49bf0f631a4289ac49fb24518c63fb03ed7a6df2af832361e764ff6

    • SSDEEP

      768:qdhO/poiiUcjlJInfFH9Xqk5nWEZ5SbTDa/WI7CPW5w:Mw+jjgnNH9XqcnW85SbT+WII

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks