General

  • Target

    JavaTest1.exe

  • Size

    50KB

  • Sample

    241009-btkqsssfmf

  • MD5

    bf0dfd236ce52a5b1878da042162db3a

  • SHA1

    fdd3a9ea08cdd4aceea09d3d20bf8dfa1711dcc7

  • SHA256

    2b503e1b5b94615ac804982d65236744d21d64c47ce9a0447d6d45624fedf462

  • SHA512

    19a4b6e097979b043edb3714776d9a538462c19cb74cd578d6dead98cf1ee0b5ada7613a2ecc1188e7b838a3dbba39fd8189841c02fbc681c81370543b23abf1

  • SSDEEP

    768:wdhO/poiiUcjlJInIFH9Xqk5nWEZ5SbTDaxlWI7CPW5uidj:iw+jjgn4H9XqcnW85SbTMlWIWiB

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

JAVACORELESX

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4444

  • startup_name

    nothingset

Targets

    • Target

      JavaTest1.exe

    • Size

      50KB

    • MD5

      bf0dfd236ce52a5b1878da042162db3a

    • SHA1

      fdd3a9ea08cdd4aceea09d3d20bf8dfa1711dcc7

    • SHA256

      2b503e1b5b94615ac804982d65236744d21d64c47ce9a0447d6d45624fedf462

    • SHA512

      19a4b6e097979b043edb3714776d9a538462c19cb74cd578d6dead98cf1ee0b5ada7613a2ecc1188e7b838a3dbba39fd8189841c02fbc681c81370543b23abf1

    • SSDEEP

      768:wdhO/poiiUcjlJInIFH9Xqk5nWEZ5SbTDaxlWI7CPW5uidj:iw+jjgn4H9XqcnW85SbTMlWIWiB

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks