General

  • Target

    852c1f349ad9389c3d449368f59be3e7f6f7d03643e46bc2760d99ac2860ff29N

  • Size

    45KB

  • Sample

    241006-z8pkaswgkn

  • MD5

    8d9be06b296e45eb29dcca7c0ca9f120

  • SHA1

    da828a56e0669b4dff97f197618b753343a3ce18

  • SHA256

    852c1f349ad9389c3d449368f59be3e7f6f7d03643e46bc2760d99ac2860ff29

  • SHA512

    9e571e661d122b4d9181fadf5b5909f3c62ca4bec2a626dbf8f291e4aafec3eb1986687efe02da1ceef815031b23e2819256536aa88892df5704b53e21592931

  • SSDEEP

    768:LdhO/poiiUcjlJInNqH9Xqk5nWEZ5SbTDa4WI7CPW5Q:5w+jjgn0H9XqcnW85SbTpWI4

Malware Config

Extracted

Family

xenorat

C2

568791365f-64388.portmap.host

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    64388

  • startup_name

    nothingset

Targets

    • Target

      852c1f349ad9389c3d449368f59be3e7f6f7d03643e46bc2760d99ac2860ff29N

    • Size

      45KB

    • MD5

      8d9be06b296e45eb29dcca7c0ca9f120

    • SHA1

      da828a56e0669b4dff97f197618b753343a3ce18

    • SHA256

      852c1f349ad9389c3d449368f59be3e7f6f7d03643e46bc2760d99ac2860ff29

    • SHA512

      9e571e661d122b4d9181fadf5b5909f3c62ca4bec2a626dbf8f291e4aafec3eb1986687efe02da1ceef815031b23e2819256536aa88892df5704b53e21592931

    • SSDEEP

      768:LdhO/poiiUcjlJInNqH9Xqk5nWEZ5SbTDa4WI7CPW5Q:5w+jjgn0H9XqcnW85SbTpWI4

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks