General

  • Target

    Копія вихідної позовної ухвали.vbs

  • Size

    14KB

  • Sample

    240902-pergpazdkj

  • MD5

    3df171ee8218dc8e8baffe34182d431f

  • SHA1

    94495da87627355cdbfd2ab36a1d7beced35ec9c

  • SHA256

    5640cb7c1399cf63031ade147e623ad9f9d63fb350addc550eae4141c2fe4431

  • SHA512

    cf7e80192f3f6379f13ee867b7248fb7153f2a6be0c6f187876b9a21430f9f2cf82863eeaf50ef35c95742c45a09eeb19d79d4d558fab076c8a6d64f2ffcf319

  • SSDEEP

    192:vNjEQQX0KGFqxncbke3u9judG27J7FN2IEu/CRRkvO3MZGsugdcGPJZMxu2hlYFH:vNOGtw79jObvFQMIsu0PJmxNSiMFpW8x

Malware Config

Extracted

Family

xenorat

C2

111.90.147.147

Mutex

fjsjhgf

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    5652

  • startup_name

    nothingset

Targets

    • Target

      Копія вихідної позовної ухвали.vbs

    • Size

      14KB

    • MD5

      3df171ee8218dc8e8baffe34182d431f

    • SHA1

      94495da87627355cdbfd2ab36a1d7beced35ec9c

    • SHA256

      5640cb7c1399cf63031ade147e623ad9f9d63fb350addc550eae4141c2fe4431

    • SHA512

      cf7e80192f3f6379f13ee867b7248fb7153f2a6be0c6f187876b9a21430f9f2cf82863eeaf50ef35c95742c45a09eeb19d79d4d558fab076c8a6d64f2ffcf319

    • SSDEEP

      192:vNjEQQX0KGFqxncbke3u9judG27J7FN2IEu/CRRkvO3MZGsugdcGPJZMxu2hlYFH:vNOGtw79jObvFQMIsu0PJmxNSiMFpW8x

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks