General

  • Target

    hthrt.exe

  • Size

    282KB

  • Sample

    241010-sa513a1ema

  • MD5

    e0cd062094dc91759786a04652af34c5

  • SHA1

    3ae1469aabf670e54487c64001a1c0a56b613495

  • SHA256

    bad91a9a05e9464d89c5c3ce08187aa07af31732f34416ef23d46d94bb78ea53

  • SHA512

    f833024b28895e7c6f33d92f257094bf93346980bbb25dd77dd30d1f1abd23b799444f6f0fdbafde25203f1efd08f93cd630182ddf22e7ba4db9a603c6a7f4e1

  • SSDEEP

    1536:Lw+jjgnAH9XqcnW85SbTCWIa7tMuBtzGulxuJVZ2eY7WHpqiH:Lw+jqS91UbTC2t7leZ2eWNo

Malware Config

Extracted

Family

xenorat

C2

192.168.244.72

Mutex

Blue.cc Temp Woofer

Attributes
  • delay

    10

  • install_path

    nothingset

  • port

    3000

  • startup_name

    nothingset

Targets

    • Target

      hthrt.exe

    • Size

      282KB

    • MD5

      e0cd062094dc91759786a04652af34c5

    • SHA1

      3ae1469aabf670e54487c64001a1c0a56b613495

    • SHA256

      bad91a9a05e9464d89c5c3ce08187aa07af31732f34416ef23d46d94bb78ea53

    • SHA512

      f833024b28895e7c6f33d92f257094bf93346980bbb25dd77dd30d1f1abd23b799444f6f0fdbafde25203f1efd08f93cd630182ddf22e7ba4db9a603c6a7f4e1

    • SSDEEP

      1536:Lw+jjgnAH9XqcnW85SbTCWIa7tMuBtzGulxuJVZ2eY7WHpqiH:Lw+jqS91UbTC2t7leZ2eWNo

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

MITRE ATT&CK Enterprise v15

Tasks