General

  • Target

    Quote List.scr.exe

  • Size

    569KB

  • Sample

    240930-fybqxatfpe

  • MD5

    dc2bce43a2b3398e375fdb600650a576

  • SHA1

    a6c6ccf9affa2095eb481950f036c00cd3c4e437

  • SHA256

    509070cd30eb4cb05c29fe8cb222166c1c7db0f6084ea5b91e37bac79c14ac30

  • SHA512

    e8591426a0d5c71cbff9ba465742a2d989cffc03b986d46961e5098d72b62df917130251d7860a2b1c622d966f94a2272eeeaf037af5f535842bf5177eb2cba0

  • SSDEEP

    12288:8NUxwjxPMBCqh/pe8hkbikWQYXLEtYt+tyKsI3TBB9kR:8NUxh//Q8hkz1wL1+tlBBg

Malware Config

Extracted

Family

xenorat

C2

66.63.168.142

Mutex

Microsoft_nd8912d

Attributes
  • delay

    5

  • install_path

    temp

  • port

    4782

  • startup_name

    nothingset

Targets

    • Target

      Quote List.scr.exe

    • Size

      569KB

    • MD5

      dc2bce43a2b3398e375fdb600650a576

    • SHA1

      a6c6ccf9affa2095eb481950f036c00cd3c4e437

    • SHA256

      509070cd30eb4cb05c29fe8cb222166c1c7db0f6084ea5b91e37bac79c14ac30

    • SHA512

      e8591426a0d5c71cbff9ba465742a2d989cffc03b986d46961e5098d72b62df917130251d7860a2b1c622d966f94a2272eeeaf037af5f535842bf5177eb2cba0

    • SSDEEP

      12288:8NUxwjxPMBCqh/pe8hkbikWQYXLEtYt+tyKsI3TBB9kR:8NUxh//Q8hkz1wL1+tlBBg

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks