General

  • Target

    4d7d224f3e38ef811723161873e2aa008d21b35084a938b255feafbdd9eb985d

  • Size

    240KB

  • Sample

    240907-1bawbaydpf

  • MD5

    d04a2b57f1746ad614eb93ad1d20d405

  • SHA1

    34c913adf2645f385cea7b25311adc53ddc6643e

  • SHA256

    4d7d224f3e38ef811723161873e2aa008d21b35084a938b255feafbdd9eb985d

  • SHA512

    f0bbbf60fdaf188d51a699ea877afb9164f75d491e28dd6b923285dba3e818cb8c76604345434075c92770e1f98b052fcfbdf8f1f79dc48df12d49f0de2e8f65

  • SSDEEP

    6144:55pLOE2BAOVudxdvcB/80QT1tN+vrwg04wpEEs0Jr7iTxKMI:5HOE8kCPrwg0ffs0Jr7iTxKp

Malware Config

Extracted

Family

xenorat

C2

154.216.17.155

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    50000

  • install_path

    appdata

  • port

    1357

  • startup_name

    crsr

Targets

    • Target

      4d7d224f3e38ef811723161873e2aa008d21b35084a938b255feafbdd9eb985d

    • Size

      240KB

    • MD5

      d04a2b57f1746ad614eb93ad1d20d405

    • SHA1

      34c913adf2645f385cea7b25311adc53ddc6643e

    • SHA256

      4d7d224f3e38ef811723161873e2aa008d21b35084a938b255feafbdd9eb985d

    • SHA512

      f0bbbf60fdaf188d51a699ea877afb9164f75d491e28dd6b923285dba3e818cb8c76604345434075c92770e1f98b052fcfbdf8f1f79dc48df12d49f0de2e8f65

    • SSDEEP

      6144:55pLOE2BAOVudxdvcB/80QT1tN+vrwg04wpEEs0Jr7iTxKMI:5HOE8kCPrwg0ffs0Jr7iTxKp

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks