General

  • Target

    Echoes of the Overgrown BETA version 1.1.exe

  • Size

    46KB

  • Sample

    241031-ee5n7szcjm

  • MD5

    fb960f0a414e6dd221301c94e345451b

  • SHA1

    7dd4fd9949b0dfcc84812fc9cde3d88e0490c9c2

  • SHA256

    15f36a2a51a3195920753b15485517b8a6bad427d9a0bd11020d46055ac22c7b

  • SHA512

    f29f36b2682d1c6616f406d3b10ee171144427ee99d93842cdc1f4f8ec13901aab3a09efbf34f68d0413a3780b3b6b30747f06f8b8941e3e402f39bf49e76451

  • SSDEEP

    768:NdhO/poiiUcjlJInaVH9Xqk5nWEZ5SbTDa2uI7CPW5/:Dw+jjgn6H9XqcnW85SbTDuIX

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    2000

  • startup_name

    localhost

Targets

    • Target

      Echoes of the Overgrown BETA version 1.1.exe

    • Size

      46KB

    • MD5

      fb960f0a414e6dd221301c94e345451b

    • SHA1

      7dd4fd9949b0dfcc84812fc9cde3d88e0490c9c2

    • SHA256

      15f36a2a51a3195920753b15485517b8a6bad427d9a0bd11020d46055ac22c7b

    • SHA512

      f29f36b2682d1c6616f406d3b10ee171144427ee99d93842cdc1f4f8ec13901aab3a09efbf34f68d0413a3780b3b6b30747f06f8b8941e3e402f39bf49e76451

    • SSDEEP

      768:NdhO/poiiUcjlJInaVH9Xqk5nWEZ5SbTDa2uI7CPW5/:Dw+jjgn6H9XqcnW85SbTDuIX

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks