General

  • Target

    TLLc.exe

  • Size

    45KB

  • Sample

    241110-xtargsshlp

  • MD5

    36b5aab052b385a20b92d9d8244322d2

  • SHA1

    b4c7e30f7edeeb921a1e06da190fe136958fd103

  • SHA256

    1bffeb2de9e3834c8d5f06ca2d0b0ce8c6b152c7da76532f05579244152441e6

  • SHA512

    3271ab0e5c8d35bef0bb3d8daf1eaf1b3fad796e01ad308a4b660ccca1c1bd3d4c01fe944914fb410a4c0ea6bbe4edd26ea062de232cf76b36dd5ea4e6f6f0cc

  • SSDEEP

    768:pdhO/poiiUcjlJInyCLue9H9Xqk5nWEZ5SbTDaAWI7CPW5J:nw+jjgntye9H9XqcnW85SbThWIx

Malware Config

Extracted

Family

xenorat

C2

tax-sri.gl.at.ply.gg

Mutex

TLLc

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    9388

  • startup_name

    TLegacyLaunncher

Targets

    • Target

      TLLc.exe

    • Size

      45KB

    • MD5

      36b5aab052b385a20b92d9d8244322d2

    • SHA1

      b4c7e30f7edeeb921a1e06da190fe136958fd103

    • SHA256

      1bffeb2de9e3834c8d5f06ca2d0b0ce8c6b152c7da76532f05579244152441e6

    • SHA512

      3271ab0e5c8d35bef0bb3d8daf1eaf1b3fad796e01ad308a4b660ccca1c1bd3d4c01fe944914fb410a4c0ea6bbe4edd26ea062de232cf76b36dd5ea4e6f6f0cc

    • SSDEEP

      768:pdhO/poiiUcjlJInyCLue9H9Xqk5nWEZ5SbTDaAWI7CPW5J:nw+jjgntye9H9XqcnW85SbThWIx

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks