General

  • Target

    Pangya56.exe

  • Size

    45KB

  • Sample

    241110-njczesypan

  • MD5

    37e143ec80feaeef29e906bb0ca6f7bf

  • SHA1

    603fd25c94f0030186250472d8e74ebc85d1abdb

  • SHA256

    d21d4ed60c7c91365c7717e573c0b9849a170b3b66604367755470e0201debfd

  • SHA512

    e59874b7eef2964740e17167b25ddccaec17b8214fc5191bf6f641c6c7f176b6c08f1c1314c1b058a94e774d40e1e6c0e9a7874bd897b3e823974d73168bdad0

  • SSDEEP

    768:vdhO/poiiUcjlJIngQuH9Xqk5nWEZ5SbTDafWI7CPW5C:lw+jjgnYH9XqcnW85SbTGWIa

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

PC-1

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    4444

  • startup_name

    Pangya56

Targets

    • Target

      Pangya56.exe

    • Size

      45KB

    • MD5

      37e143ec80feaeef29e906bb0ca6f7bf

    • SHA1

      603fd25c94f0030186250472d8e74ebc85d1abdb

    • SHA256

      d21d4ed60c7c91365c7717e573c0b9849a170b3b66604367755470e0201debfd

    • SHA512

      e59874b7eef2964740e17167b25ddccaec17b8214fc5191bf6f641c6c7f176b6c08f1c1314c1b058a94e774d40e1e6c0e9a7874bd897b3e823974d73168bdad0

    • SSDEEP

      768:vdhO/poiiUcjlJIngQuH9Xqk5nWEZ5SbTDafWI7CPW5C:lw+jjgnYH9XqcnW85SbTGWIa

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks