General

  • Target

    15102024_0026_14102024_Transferencia.gz

  • Size

    532KB

  • Sample

    241015-arftdsxhqm

  • MD5

    bd9334bf506f5b443fdd4f6659067ff6

  • SHA1

    09bc8d81579ad9117e87c3e6c3802878f9f31279

  • SHA256

    ec60a432c1a530aae177d585e8308bb5ac93622ab8c91557b6b8995911586bf5

  • SHA512

    055b6ad74d8ccdf71e161f131b2f2c6f039ac7bb4aac0ebd00a7e2d336df8aebb06782db1bfc55592f28085c785cc4f0c4992ba03cee03e3be2f729e2f1783bd

  • SSDEEP

    12288:KDHTWT3X29uzSSxRoXvwd2C8078/iY7Gv/9RqxC5rid:gSmumy+vo8078/iQg9RqPd

Malware Config

Extracted

Family

xenorat

C2

87.120.116.115

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    50000

  • install_path

    appdata

  • port

    1391

  • startup_name

    nothingset

Targets

    • Target

      Transferencia.exe

    • Size

      712KB

    • MD5

      205f93678f0207a93801654d71ddb792

    • SHA1

      4f5aa1639d9c85d93060ebecd17fbe7f0fef313c

    • SHA256

      3138fbe3448390de473a313644fd2a205e7e08de043d5097b37db857c40bfad0

    • SHA512

      0784187f0c40f1d428c3b982797f95c29485c43b8197ecaff305f926994222bc7e1f7de4f98205376a86f81676485c232f8732c1e756d159a5bf74d13f1f5a20

    • SSDEEP

      12288:JcrNS33L10QdrX4FBojL8DPNYnyV1Rotvwd2CO078/iY7Qlz9Rq/CvrvU:0NA3R5drX4GcPNYyr2voO078/iQI9RqN

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks