General

  • Target

    viruses.exe

  • Size

    212KB

  • Sample

    240908-ek1bnsxana

  • MD5

    da012664ec1359efc6bee1a1f7ceb336

  • SHA1

    e3699468cc560df41ae5581037188f9ea428242c

  • SHA256

    3112a7d89b1501287adc07bee141cb5d01fb6072a8600aa571fe81b0f1bc15af

  • SHA512

    2004842c9d25ee3a380167e00494b064067717daf981fc483e1890676e842ef0f02d3d7d9eabb951bfdf84697760e79fc6b4ac65678d1db22f5f02c5562d4a76

  • SSDEEP

    1536:Pw+jjgnWH9XqcnW85SbT2WIIUqo6nZ8f8:Pw+jqY91UbT2uC6nc8

Malware Config

Extracted

Family

xenorat

C2

tragiciscool-36173.portmap.host

Mutex

hatetranspeople@123-skids-only-downloaded-this-shit-lmao!

Attributes
  • delay

    1

  • install_path

    appdata

  • port

    36173

  • startup_name

    Windows Defender

Targets

    • Target

      viruses.exe

    • Size

      212KB

    • MD5

      da012664ec1359efc6bee1a1f7ceb336

    • SHA1

      e3699468cc560df41ae5581037188f9ea428242c

    • SHA256

      3112a7d89b1501287adc07bee141cb5d01fb6072a8600aa571fe81b0f1bc15af

    • SHA512

      2004842c9d25ee3a380167e00494b064067717daf981fc483e1890676e842ef0f02d3d7d9eabb951bfdf84697760e79fc6b4ac65678d1db22f5f02c5562d4a76

    • SSDEEP

      1536:Pw+jjgnWH9XqcnW85SbT2WIIUqo6nZ8f8:Pw+jqY91UbT2uC6nc8

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks