General

  • Target

    15ad522ec1e3313921cb6d311a87bca109ac311a3bfd416019fe64a7c60b3dc1.exe

  • Size

    657KB

  • Sample

    240908-brvszswflq

  • MD5

    7ba37f3ac2258f9a33ebd1330617ef41

  • SHA1

    b995513d63a7bd394099b44e7cc3269f5d02acc4

  • SHA256

    15ad522ec1e3313921cb6d311a87bca109ac311a3bfd416019fe64a7c60b3dc1

  • SHA512

    0e31d37d86885e2ed8e70756adbab74540273299cad2ed71ea90fd9718d0f019c88f450bb92a1a0ea6419eb02c3c3ade96e3448170c2857ba2ba1dc31a891995

  • SSDEEP

    12288:NcrNS33L10QdrXjivfDnCr9BzOZ/fb67UjVXUSUp9Cq3wYNsMU3yRs:wNA3R5drXWvfDCr9ByNfb6ojZpOxwoRm

Malware Config

Extracted

Family

xenorat

C2

154.216.17.155

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    50000

  • install_path

    appdata

  • port

    1357

  • startup_name

    crsr

Targets

    • Target

      15ad522ec1e3313921cb6d311a87bca109ac311a3bfd416019fe64a7c60b3dc1.exe

    • Size

      657KB

    • MD5

      7ba37f3ac2258f9a33ebd1330617ef41

    • SHA1

      b995513d63a7bd394099b44e7cc3269f5d02acc4

    • SHA256

      15ad522ec1e3313921cb6d311a87bca109ac311a3bfd416019fe64a7c60b3dc1

    • SHA512

      0e31d37d86885e2ed8e70756adbab74540273299cad2ed71ea90fd9718d0f019c88f450bb92a1a0ea6419eb02c3c3ade96e3448170c2857ba2ba1dc31a891995

    • SSDEEP

      12288:NcrNS33L10QdrXjivfDnCr9BzOZ/fb67UjVXUSUp9Cq3wYNsMU3yRs:wNA3R5drXWvfDCr9ByNfb6ojZpOxwoRm

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks