General

  • Target

    060f749a9f6dd6d01ce5e9399cfd5a3c6dfa30ce235b963da6908ec20c9e662eN

  • Size

    353KB

  • Sample

    240918-qle8nssfng

  • MD5

    c59e8398a4a108377577812edf04e400

  • SHA1

    db5d9f098cf734a264a8498415cac9e07ff8c6e1

  • SHA256

    060f749a9f6dd6d01ce5e9399cfd5a3c6dfa30ce235b963da6908ec20c9e662e

  • SHA512

    1d5726417b1e3c997ddf8cee2fe9e0fa5b95906d3f005e488970e5fd76661d11afc4a157927994fec519667ca22027952f7a606544c9c349c309f6ab455ebafe

  • SSDEEP

    6144:rYzKLkHS0skTXfW2yqq4TCkq4+jQRYj0y/LpH0I:rrLkHZXO2yt4TY3jQRYj0y/Lxh

Malware Config

Extracted

Family

xenorat

C2

154.216.17.155

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    50010

  • install_path

    appdata

  • port

    1358

  • startup_name

    csvc

Targets

    • Target

      060f749a9f6dd6d01ce5e9399cfd5a3c6dfa30ce235b963da6908ec20c9e662eN

    • Size

      353KB

    • MD5

      c59e8398a4a108377577812edf04e400

    • SHA1

      db5d9f098cf734a264a8498415cac9e07ff8c6e1

    • SHA256

      060f749a9f6dd6d01ce5e9399cfd5a3c6dfa30ce235b963da6908ec20c9e662e

    • SHA512

      1d5726417b1e3c997ddf8cee2fe9e0fa5b95906d3f005e488970e5fd76661d11afc4a157927994fec519667ca22027952f7a606544c9c349c309f6ab455ebafe

    • SSDEEP

      6144:rYzKLkHS0skTXfW2yqq4TCkq4+jQRYj0y/LpH0I:rrLkHZXO2yt4TY3jQRYj0y/Lxh

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks