General

  • Target

    18092024_0114_17092024_Pago Pendiente.gz

  • Size

    225KB

  • Sample

    240918-blngqavcpe

  • MD5

    c8f301e0def97ef0aaf4c0a225a7ef11

  • SHA1

    efe302a00430e3561960414326a67190063a0f32

  • SHA256

    46dbc8ab5568cc6cd6448cf32589a57f98eefebbafa8f57ec0ecd239480a6767

  • SHA512

    2055fa84b8bf27a97a88abe4c2dfac1018c520310231e504cc2433c6bd5943a757cb444c31e422966492b59e7cd518f6ef549f7ce47f874c6926a78a3b42dcae

  • SSDEEP

    6144:ARVE4ciK2da3BnN9O4TSGmZnKcJZjWhCVNv754rm:8L5Kia3BNBSGmZnvshCVNv754rm

Malware Config

Extracted

Family

xenorat

C2

154.216.17.155

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    50010

  • install_path

    appdata

  • port

    1359

  • startup_name

    cvcr

Targets

    • Target

      Pago Pendiente.exe

    • Size

      349KB

    • MD5

      801c9030471f7628b4d4420f5f39d4bc

    • SHA1

      2ba63101806334f1ea3460c3eec88bb413a850a9

    • SHA256

      e549d0806346bc3a34579c8af334c61be85c169bf735deb49de85b70bad3549a

    • SHA512

      7255144d46c2e642ae5399ad5040c7bce508f2b332ef55d6c3cfe6450dcc0c9d8356618b439d35c177648c8fc3d06644d39ca0df431f082207bafb1445d4aa32

    • SSDEEP

      6144:Gha3BXN9O4vSGmZnKkJZNGXsPrN9HbPWqqGHRZI:Ca3B9xSGmZn5+XWR9HbPWqqGHE

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks