General

  • Target

    XClient.exe

  • Size

    60KB

  • Sample

    241111-1blyksxbjl

  • MD5

    de5e007cca8560c530ed376d6647436e

  • SHA1

    6d93702a99859ee7c8014ad28650139f544e486e

  • SHA256

    b666248414334aa764720592fd1d5d5789c3036654ec98d8e4bc9ff6da75b218

  • SHA512

    f1e4b994f5dd0251b99e536cf203d7c98590b8ac338006b120d4a8362c764973eb5353eecb949bfde177608d3c04076396da26d3f1359068275fa7fc2c1b234f

  • SSDEEP

    1536:F8QzsjdmRvsl4nTzqDZqwhUQbPtyA26rj6lOLECD:hkl2CAwbPtcOw0

Malware Config

Extracted

Family

xworm

C2

147.185.221.23:17647

Attributes
  • Install_directory

    %AppData%

  • install_file

    System32.exe

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    12345

  • startup_name

    nothingset

Targets

    • Target

      XClient.exe

    • Size

      60KB

    • MD5

      de5e007cca8560c530ed376d6647436e

    • SHA1

      6d93702a99859ee7c8014ad28650139f544e486e

    • SHA256

      b666248414334aa764720592fd1d5d5789c3036654ec98d8e4bc9ff6da75b218

    • SHA512

      f1e4b994f5dd0251b99e536cf203d7c98590b8ac338006b120d4a8362c764973eb5353eecb949bfde177608d3c04076396da26d3f1359068275fa7fc2c1b234f

    • SSDEEP

      1536:F8QzsjdmRvsl4nTzqDZqwhUQbPtyA26rj6lOLECD:hkl2CAwbPtcOw0

    • Detect XenoRat Payload

    • Detect Xworm Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks