General

  • Target

    28092024_0315_26092024_Pago.09.26.2024.gz

  • Size

    210KB

  • Sample

    240928-drywratgpp

  • MD5

    e460d5b3216f36126761d0241257de60

  • SHA1

    92b2bef82f71b78a4f713facaa2359081cdee237

  • SHA256

    2ad5653826ca219c21abade6c432e450a8a853191ddc0728a3c748bae031467c

  • SHA512

    6a7cba3ac208752faf23865842076c9442a99edcec40cd4a67a61492e15fb36203e35c7419dd5c9923951be0b5f02456499138bde1a2a9f8dd74531b4d6e3232

  • SSDEEP

    6144:MC0Ogtrl76b3uR8j+rS2jRJWkIaXt43f9105:REd6DmS+rpRJWkVXc105

Malware Config

Extracted

Family

xenorat

C2

154.216.17.207

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4448

  • startup_name

    rscv.exe

Targets

    • Target

      Pago.09.26.2024.exe

    • Size

      240KB

    • MD5

      9db85d8ad7a6a8604245cfe2cf28ed98

    • SHA1

      15fd23324049f3d76bdd5c25f75ef79a0e83dcea

    • SHA256

      80d58f595084e1daff4180c2984e40eed2792a4afbbfbd3cfa67374291b78742

    • SHA512

      92b9210aa58f14a660f0b2d0d26d71d35b5acc659ba3f1789315ee3f3a8a453aa976d5547271d266f309a0ffb49125d18c93cfcb26b8f4696d1d1ff1f7682b72

    • SSDEEP

      6144:vgkcoKal76b3uR8j+rSwjRXWkIaXt43Z910ic39O8+JaYII:zpd6DmS+rhRXWkVX410ic39O8+JaY1

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks