General

  • Target

    BD2152F40DC99EC6DAE3BC14B6929BDB.exe

  • Size

    45KB

  • Sample

    240831-ql932svhqn

  • MD5

    bd2152f40dc99ec6dae3bc14b6929bdb

  • SHA1

    32f787e0c931fa31dae7de1ad21edbca57d31866

  • SHA256

    034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1

  • SHA512

    62d8a97c16d74ca8aae86afd103004b93f5f9aeb5e54380820005576ea22ca304977d80e82971e1af860c6881326d3c5991fda3587e8bd39c6c888e7b3ea5a8e

  • SSDEEP

    768:edhO/poiiUcjlJIniFH9Xqk5nWEZ5SbTDakWI7CPW5V:ow+jjgnSH9XqcnW85SbT1WId

Malware Config

Extracted

Family

xenorat

C2

2.58.85.196

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    2323

  • startup_name

    nothingset

Targets

    • Target

      BD2152F40DC99EC6DAE3BC14B6929BDB.exe

    • Size

      45KB

    • MD5

      bd2152f40dc99ec6dae3bc14b6929bdb

    • SHA1

      32f787e0c931fa31dae7de1ad21edbca57d31866

    • SHA256

      034fe3881efdcf850d43cfe8e2013c303db4b0a3729f61acce608cbeefa3b1d1

    • SHA512

      62d8a97c16d74ca8aae86afd103004b93f5f9aeb5e54380820005576ea22ca304977d80e82971e1af860c6881326d3c5991fda3587e8bd39c6c888e7b3ea5a8e

    • SSDEEP

      768:edhO/poiiUcjlJIniFH9Xqk5nWEZ5SbTDakWI7CPW5V:ow+jjgnSH9XqcnW85SbT1WId

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks