General

  • Target

    wahoo.exe

  • Size

    45KB

  • Sample

    240930-klb85awakq

  • MD5

    783cb143f722d2b7950d83cd5056de12

  • SHA1

    c93a49a4cb10dcc9a39b435d4da209596201edaf

  • SHA256

    a3d838b5f60887240be29ec626a5cbcb4785066f0785a524e9f90dcf4cae3e76

  • SHA512

    727b00d454f15907ccbcabd5be819745d5f3876c28f09c7a94941c2b033591f1f4d1adb61f28bea5933b2395bdd37d9d23bc59d946a36d8dc6c3f3387744d1ed

  • SSDEEP

    768:SdhO/poiiUcjlJInWsWH9Xqk5nWEZ5SbTDavuI7CPW5h:0w+jjgnYH9XqcnW85SbTSuI5

Malware Config

Extracted

Family

xenorat

C2

192.168.1.223

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    4444

  • startup_name

    lika

Targets

    • Target

      wahoo.exe

    • Size

      45KB

    • MD5

      783cb143f722d2b7950d83cd5056de12

    • SHA1

      c93a49a4cb10dcc9a39b435d4da209596201edaf

    • SHA256

      a3d838b5f60887240be29ec626a5cbcb4785066f0785a524e9f90dcf4cae3e76

    • SHA512

      727b00d454f15907ccbcabd5be819745d5f3876c28f09c7a94941c2b033591f1f4d1adb61f28bea5933b2395bdd37d9d23bc59d946a36d8dc6c3f3387744d1ed

    • SSDEEP

      768:SdhO/poiiUcjlJInWsWH9Xqk5nWEZ5SbTDavuI7CPW5h:0w+jjgnYH9XqcnW85SbTSuI5

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

MITRE ATT&CK Enterprise v15

Tasks