General

  • Target

    388d80a52076aa1f8329606606b21086eddf22d051624057b329c9250489f0c7.exe

  • Size

    45KB

  • Sample

    241015-ggvywsxhqg

  • MD5

    08f804cc6d0c9728631b8fd86b3cfdf5

  • SHA1

    eb478c94b0c1c8bb814af267d41a73fa23bc8175

  • SHA256

    388d80a52076aa1f8329606606b21086eddf22d051624057b329c9250489f0c7

  • SHA512

    da6ca24b2f8ceb88d00ef8b1ea9846d17dd0b08cf58b80d7a809b76e6cccc3a89291e2e240883371312d77e474a36e9d654fab7eb60b56a1ef887fd2a291990d

  • SSDEEP

    768:mdhO/poiiUcjlJInIzH9Xqk5nWEZ5SbTDapWI7CPW5E:Qw+jjgnKH9XqcnW85SbToWI8

Malware Config

Extracted

Family

xenorat

C2

osocraft.ddns.net

Mutex

IAMAFUCKINGRAN

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    25566

  • startup_name

    Client

Targets

    • Target

      388d80a52076aa1f8329606606b21086eddf22d051624057b329c9250489f0c7.exe

    • Size

      45KB

    • MD5

      08f804cc6d0c9728631b8fd86b3cfdf5

    • SHA1

      eb478c94b0c1c8bb814af267d41a73fa23bc8175

    • SHA256

      388d80a52076aa1f8329606606b21086eddf22d051624057b329c9250489f0c7

    • SHA512

      da6ca24b2f8ceb88d00ef8b1ea9846d17dd0b08cf58b80d7a809b76e6cccc3a89291e2e240883371312d77e474a36e9d654fab7eb60b56a1ef887fd2a291990d

    • SSDEEP

      768:mdhO/poiiUcjlJInIzH9Xqk5nWEZ5SbTDapWI7CPW5E:Qw+jjgnKH9XqcnW85SbToWI8

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks