General

  • Target

    sigma f.exe

  • Size

    45KB

  • Sample

    241112-z4dx1a1frg

  • MD5

    a12827f79269f0447b2754e5a47a4c2e

  • SHA1

    242c6d7451f8561ac57ef212b52b8314bcd2a39d

  • SHA256

    37bd9603cb7c0c74f5db46c0d38108f7b761644cb9f7c465f73d88a9502f8501

  • SHA512

    4d24c294578654d1fd29705209fbdd827e7a429b74997009eae72e3f08472d2471b0b12dca9f51bc956b9b54292dff9f3e042fd12558081e45a1b3386345cd5c

  • SSDEEP

    768:FdhO/poiiUcjlJIngzH9Xqk5nWEZ5SbTDagWI7CPW5N:bw+jjgnCH9XqcnW85SbTpWIl

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    22298

  • startup_name

    bich.bat

Targets

    • Target

      sigma f.exe

    • Size

      45KB

    • MD5

      a12827f79269f0447b2754e5a47a4c2e

    • SHA1

      242c6d7451f8561ac57ef212b52b8314bcd2a39d

    • SHA256

      37bd9603cb7c0c74f5db46c0d38108f7b761644cb9f7c465f73d88a9502f8501

    • SHA512

      4d24c294578654d1fd29705209fbdd827e7a429b74997009eae72e3f08472d2471b0b12dca9f51bc956b9b54292dff9f3e042fd12558081e45a1b3386345cd5c

    • SSDEEP

      768:FdhO/poiiUcjlJIngzH9Xqk5nWEZ5SbTDagWI7CPW5N:bw+jjgnCH9XqcnW85SbTpWIl

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks