General

  • Target

    deez.exe

  • Size

    633KB

  • Sample

    241017-erdfgsveqj

  • MD5

    1037dacecb1fc38281609aab18b4aa34

  • SHA1

    742f49dad52e52c7a0c4eb1b8c2f2191b9465c7b

  • SHA256

    e71e8323eb3783160d04d19ea2d664ee873a91cc175af4ef1b6611aef0122ea5

  • SHA512

    cb02647ed8fa08f452b5cd7bc71a3e29e57e916772edbba9711f4993ca84309cac0494a154045826d73267730b1c21fffc56f7f26ebdf30e58c6b16df8d26eb8

  • SSDEEP

    6144:XWH91UbO9Gj+KEXvME3zfjsu9oAsIxqqCSMgYPH7fffo:XwbGi70EzjDZ/K1zf4

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

lolblox

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    4444

  • startup_name

    nothingset

Targets

    • Target

      deez.exe

    • Size

      633KB

    • MD5

      1037dacecb1fc38281609aab18b4aa34

    • SHA1

      742f49dad52e52c7a0c4eb1b8c2f2191b9465c7b

    • SHA256

      e71e8323eb3783160d04d19ea2d664ee873a91cc175af4ef1b6611aef0122ea5

    • SHA512

      cb02647ed8fa08f452b5cd7bc71a3e29e57e916772edbba9711f4993ca84309cac0494a154045826d73267730b1c21fffc56f7f26ebdf30e58c6b16df8d26eb8

    • SSDEEP

      6144:XWH91UbO9Gj+KEXvME3zfjsu9oAsIxqqCSMgYPH7fffo:XwbGi70EzjDZ/K1zf4

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

MITRE ATT&CK Enterprise v15

Tasks