General

  • Target

    TransAgenda.exe

  • Size

    127KB

  • Sample

    240813-g82whstcrq

  • MD5

    8dbebef8a47ea96ceed4408641e195ce

  • SHA1

    b13a236bdf60de5fac38ab11344392eadb7462a9

  • SHA256

    2bee910afaec59b55af87e2056a52cc43d879a2582dc5d148bcf696ddbd0516d

  • SHA512

    9159cf5a19963d73d947cf17db303eb84353a0237b03bb61fc553b6945f3c670da79cc5185211a793effa191ef438f0ce3f1b894dde3983cc068adce0757540d

  • SSDEEP

    3072:9w+jqT91UbTkTxswif42DRk1u1F33bIWQD4agDUbjwAGy7:qW291UbuqfhdkY1F3rTQD4agwfwby

Malware Config

Extracted

Family

xenorat

C2

174.60.140.164

Mutex

Xeno_rat_nd8912f

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    7707

  • startup_name

    TransAgenda

Targets

    • Target

      TransAgenda.exe

    • Size

      127KB

    • MD5

      8dbebef8a47ea96ceed4408641e195ce

    • SHA1

      b13a236bdf60de5fac38ab11344392eadb7462a9

    • SHA256

      2bee910afaec59b55af87e2056a52cc43d879a2582dc5d148bcf696ddbd0516d

    • SHA512

      9159cf5a19963d73d947cf17db303eb84353a0237b03bb61fc553b6945f3c670da79cc5185211a793effa191ef438f0ce3f1b894dde3983cc068adce0757540d

    • SSDEEP

      3072:9w+jqT91UbTkTxswif42DRk1u1F33bIWQD4agDUbjwAGy7:qW291UbuqfhdkY1F3rTQD4agwfwby

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks