General

  • Target

    6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe

  • Size

    45KB

  • Sample

    240913-3ljx3svfqq

  • MD5

    bb8712b4382955760eb56b2db9f1965d

  • SHA1

    b40feb63f86dca36a4accb9b96aff9bf95b1eb43

  • SHA256

    6c7ccc122fac3ed22879b0b82b2874a375ec9236827127ec784eafc607740a83

  • SHA512

    a592e17c3a417a4a50c5b45800ff1db3514ddeb70b6153e5c9ebfb1f13d4482035847d313e188e6158f4eb527a471f25d8d53762d9c812fa6932794084f036e4

  • SSDEEP

    768:NdhO/poiiUcjlJInywH9Xqk5nWEZ5SbTDa6WI7CPW5c:Dw+jjgnLH9XqcnW85SbT7WIk

Malware Config

Extracted

Family

xenorat

C2

49.194.29.240

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4444

  • startup_name

    MicrosoftAudioService

Targets

    • Target

      6c7ccc122fac3ed22879b0b82b2874a375ec923682712.exe

    • Size

      45KB

    • MD5

      bb8712b4382955760eb56b2db9f1965d

    • SHA1

      b40feb63f86dca36a4accb9b96aff9bf95b1eb43

    • SHA256

      6c7ccc122fac3ed22879b0b82b2874a375ec9236827127ec784eafc607740a83

    • SHA512

      a592e17c3a417a4a50c5b45800ff1db3514ddeb70b6153e5c9ebfb1f13d4482035847d313e188e6158f4eb527a471f25d8d53762d9c812fa6932794084f036e4

    • SSDEEP

      768:NdhO/poiiUcjlJInywH9Xqk5nWEZ5SbTDa6WI7CPW5c:Dw+jjgnLH9XqcnW85SbT7WIk

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks