General

  • Target

    2024-09-29_b78b54b3cd92020748bfd9dbf6328b8b_ryuk

  • Size

    6.4MB

  • Sample

    240929-xdvfyszana

  • MD5

    b78b54b3cd92020748bfd9dbf6328b8b

  • SHA1

    0c5ac4a7dec5b6236c3b6c1c1bede3f31058e391

  • SHA256

    58eb8bb990ecf44f3906a6d1f26ad6d33fcb4ce46ffd3e45eeb5aff3711cbb75

  • SHA512

    6959f7818e851782eec5068967581d31379436dc6b23ee876b2486e5f053b9dfac44c227dad0817f0abc265445512557b488345a6287dcfa1264a51cc0c10d1b

  • SSDEEP

    196608:/LbWorZnOETSo/g8xobLWtx+PNFWOgLfMgf:jbRqoo8U9F6Qg

Malware Config

Targets

    • Target

      2024-09-29_b78b54b3cd92020748bfd9dbf6328b8b_ryuk

    • Size

      6.4MB

    • MD5

      b78b54b3cd92020748bfd9dbf6328b8b

    • SHA1

      0c5ac4a7dec5b6236c3b6c1c1bede3f31058e391

    • SHA256

      58eb8bb990ecf44f3906a6d1f26ad6d33fcb4ce46ffd3e45eeb5aff3711cbb75

    • SHA512

      6959f7818e851782eec5068967581d31379436dc6b23ee876b2486e5f053b9dfac44c227dad0817f0abc265445512557b488345a6287dcfa1264a51cc0c10d1b

    • SSDEEP

      196608:/LbWorZnOETSo/g8xobLWtx+PNFWOgLfMgf:jbRqoo8U9F6Qg

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Executes dropped EXE

    • Loads dropped DLL

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks