General

  • Target

    output_script.ps1

  • Size

    60KB

  • Sample

    241115-1s14tsslbt

  • MD5

    d2c91090b3463475fa41bb45e31955da

  • SHA1

    e8caae205de7a85b3857a93516ef60ce9d3fb2ba

  • SHA256

    8abfafa85a7109f7a6b5c010333fe1aa4a9feac5c225a4e7dd87e7ac09efe271

  • SHA512

    ad155fcefd2c3b9df6fabd14ebfaf4e8d73648aa69ee01dfd90c188faa17bf5a0c011049ca3702d77c49a0d770fc288dce7e970173876714d00967bbb627f2fa

  • SSDEEP

    1536:rqzkCPZcgt/fREZ1J5k4rX5uyC+ZgwiHNv+xYEnR6/q:rufnhtvy6S

Malware Config

Extracted

Family

xenorat

C2

195.88.218.66

Mutex

Loli

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    30101

  • startup_name

    Edge

Targets

    • Target

      output_script.ps1

    • Size

      60KB

    • MD5

      d2c91090b3463475fa41bb45e31955da

    • SHA1

      e8caae205de7a85b3857a93516ef60ce9d3fb2ba

    • SHA256

      8abfafa85a7109f7a6b5c010333fe1aa4a9feac5c225a4e7dd87e7ac09efe271

    • SHA512

      ad155fcefd2c3b9df6fabd14ebfaf4e8d73648aa69ee01dfd90c188faa17bf5a0c011049ca3702d77c49a0d770fc288dce7e970173876714d00967bbb627f2fa

    • SSDEEP

      1536:rqzkCPZcgt/fREZ1J5k4rX5uyC+ZgwiHNv+xYEnR6/q:rufnhtvy6S

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks