General

  • Target

    doxxing tools.exe

  • Size

    45KB

  • Sample

    241115-2ve5tavanm

  • MD5

    2c793b3221f10acac5abf94c66cdffad

  • SHA1

    fc87d203a90c393a4a8077cd56e2d0440cf44eb2

  • SHA256

    8cb13d52c6106edd9c40b5144b1f6c23f223fc06e65b62c096e9da9ec86cbd29

  • SHA512

    f69ce3c562621663afccdd2eb53caae363efe0b53a01dac668a093ba7d0e2aa07a3c2bb7dc4eb7832e93e6491989d28940c3bf015a4cee40858775be0416b06e

  • SSDEEP

    768:1dhO/poiiUcjlJIn2VH9Xqk5nWEZ5SbTDaJuI7CPW5Y:Lw+jjgn+H9XqcnW85SbTMuIg

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4444

  • startup_name

    Photos

Targets

    • Target

      doxxing tools.exe

    • Size

      45KB

    • MD5

      2c793b3221f10acac5abf94c66cdffad

    • SHA1

      fc87d203a90c393a4a8077cd56e2d0440cf44eb2

    • SHA256

      8cb13d52c6106edd9c40b5144b1f6c23f223fc06e65b62c096e9da9ec86cbd29

    • SHA512

      f69ce3c562621663afccdd2eb53caae363efe0b53a01dac668a093ba7d0e2aa07a3c2bb7dc4eb7832e93e6491989d28940c3bf015a4cee40858775be0416b06e

    • SSDEEP

      768:1dhO/poiiUcjlJIn2VH9Xqk5nWEZ5SbTDaJuI7CPW5Y:Lw+jjgn+H9XqcnW85SbTMuIg

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks