General

  • Target

    Pasword a.zip

  • Size

    20KB

  • Sample

    240901-kk236awhjh

  • MD5

    8cdbd8d4e5bf9018b928077965d74a76

  • SHA1

    2ece6a83c528c89e911d482a8ce71eabd40424ba

  • SHA256

    5a4e290904ff3aeaac035c7e32f84eb7bf99d5cf803d5f1ec3dbbc18577a73e4

  • SHA512

    7cb854e9ab5ac263a8e2cc658d8fd56875000fea9e624a4f540b2ab916e3d4db38b81b4bd81a982a2da3190d5f45456045ce8983c1c90a77cefa1a7d6e14e654

  • SSDEEP

    384:P7stzqo58nJ7Y2SHAbEzRONzR2z6XAN1dbt6VpgNMO8deoh1FP+pl6k8bH:P7sGnpYWuRCcz6C1Rt6VqoeoftRkoH

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    1

  • install_path

    appdata

  • port

    69

  • startup_name

    System-33

Targets

    • Target

      New folder/Fixer.exe

    • Size

      45KB

    • MD5

      5ef7344600895b2f13d5d8e44537d946

    • SHA1

      bdf05e86b0c923a0c1edead40cc50819b185d4c0

    • SHA256

      50866224673bc35d89ba701eaf3e794f452fecf308e9fab36be21fe8c486a9d0

    • SHA512

      9563e4b2c98e3ccc8b47c9739a9a74680c9782f1bd18d67c80fb5f85e6bc667df72978b3d7858ddb30ba522d574215b720a2792b7e9e6d34759d0cdc2eb43c69

    • SSDEEP

      768:OdhO/poiiUcjlJInMzH9Xqk5nWEZ5SbTDadWI7CPW5h:Yw+jjgnuH9XqcnW85SbTMWI5

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks