General
-
Target
TLLc.exe
-
Size
45KB
-
Sample
241110-xtargsshlp
-
MD5
36b5aab052b385a20b92d9d8244322d2
-
SHA1
b4c7e30f7edeeb921a1e06da190fe136958fd103
-
SHA256
1bffeb2de9e3834c8d5f06ca2d0b0ce8c6b152c7da76532f05579244152441e6
-
SHA512
3271ab0e5c8d35bef0bb3d8daf1eaf1b3fad796e01ad308a4b660ccca1c1bd3d4c01fe944914fb410a4c0ea6bbe4edd26ea062de232cf76b36dd5ea4e6f6f0cc
-
SSDEEP
768:pdhO/poiiUcjlJInyCLue9H9Xqk5nWEZ5SbTDaAWI7CPW5J:nw+jjgntye9H9XqcnW85SbThWIx
Behavioral task
behavioral1
Sample
TLLc.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
TLLc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xenorat
tax-sri.gl.at.ply.gg
TLLc
-
delay
5000
-
install_path
appdata
-
port
9388
-
startup_name
TLegacyLaunncher
Targets
-
-
Target
TLLc.exe
-
Size
45KB
-
MD5
36b5aab052b385a20b92d9d8244322d2
-
SHA1
b4c7e30f7edeeb921a1e06da190fe136958fd103
-
SHA256
1bffeb2de9e3834c8d5f06ca2d0b0ce8c6b152c7da76532f05579244152441e6
-
SHA512
3271ab0e5c8d35bef0bb3d8daf1eaf1b3fad796e01ad308a4b660ccca1c1bd3d4c01fe944914fb410a4c0ea6bbe4edd26ea062de232cf76b36dd5ea4e6f6f0cc
-
SSDEEP
768:pdhO/poiiUcjlJInyCLue9H9Xqk5nWEZ5SbTDaAWI7CPW5J:nw+jjgntye9H9XqcnW85SbThWIx
Score10/10-
Detect XenoRat Payload
-
Xenorat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Scheduled Task/Job
1Scheduled Task
1