General

  • Target

    1830751292137e0a07f9a3fc9faf631d3ba3b2ed4a1aba6fdb3f8e3dad8ea149

  • Size

    372KB

  • Sample

    241113-ys373s1rbn

  • MD5

    0fd2fb57d697134c46176d4fcf246c58

  • SHA1

    52fe4673a83061ca16e4b9a374c085ef5543764f

  • SHA256

    1830751292137e0a07f9a3fc9faf631d3ba3b2ed4a1aba6fdb3f8e3dad8ea149

  • SHA512

    26e6f4e42df55acfd31681727fcc9e5ed6d8816796963f1a4b05fa9908970714719238ec6800d65724aca88ead75945626a84ba236636678de29e78c99c2cf58

  • SSDEEP

    6144:mDKW1Lgbdl0TBBvjc/eVMUfTYOrQGznwWPatMGpjSTBvt0ZSwtQe:Ah1Lk70TnvjcmzEW0ZS5e

Malware Config

Targets

    • Target

      1830751292137e0a07f9a3fc9faf631d3ba3b2ed4a1aba6fdb3f8e3dad8ea149

    • Size

      372KB

    • MD5

      0fd2fb57d697134c46176d4fcf246c58

    • SHA1

      52fe4673a83061ca16e4b9a374c085ef5543764f

    • SHA256

      1830751292137e0a07f9a3fc9faf631d3ba3b2ed4a1aba6fdb3f8e3dad8ea149

    • SHA512

      26e6f4e42df55acfd31681727fcc9e5ed6d8816796963f1a4b05fa9908970714719238ec6800d65724aca88ead75945626a84ba236636678de29e78c99c2cf58

    • SSDEEP

      6144:mDKW1Lgbdl0TBBvjc/eVMUfTYOrQGznwWPatMGpjSTBvt0ZSwtQe:Ah1Lk70TnvjcmzEW0ZS5e

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

MITRE ATT&CK Enterprise v15

Tasks