Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 10:55

General

  • Target

    3c17536c9824395560e1c82edf9fd329018a30443408220bd8f69e03c4d23bbd.exe

  • Size

    45KB

  • MD5

    f1328e251cf2393078be810afacde1f9

  • SHA1

    e0638a74e19cb95057442460daec0dec14379063

  • SHA256

    3c17536c9824395560e1c82edf9fd329018a30443408220bd8f69e03c4d23bbd

  • SHA512

    5744ddafaa8b3913382ca9bd3fc1650109bd4368a8870517e59057881e1a5a9eb91689bdc545edd4b22a8f0652d7c93fde29a0e67866c06f0f3f3f984a587ab1

  • SSDEEP

    768:LbdhO/poiiUcjlJInZXSeH9Xqk5nWEZ5SbTDa8WI7CPW5Kj:LJw+jjgnNH9XqcnW85SbT9WICj

Malware Config

Extracted

Family

xenorat

C2

cinasa.duckdns.org

Mutex

pastj

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    2424

  • startup_name

    nothingset

Signatures

  • Detect XenoRat Payload 1 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c17536c9824395560e1c82edf9fd329018a30443408220bd8f69e03c4d23bbd.exe
    "C:\Users\Admin\AppData\Local\Temp\3c17536c9824395560e1c82edf9fd329018a30443408220bd8f69e03c4d23bbd.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2324-0-0x00000000743CE000-0x00000000743CF000-memory.dmp

    Filesize

    4KB

  • memory/2324-1-0x0000000000880000-0x0000000000892000-memory.dmp

    Filesize

    72KB

  • memory/2324-2-0x00000000743C0000-0x0000000074B70000-memory.dmp

    Filesize

    7.7MB

  • memory/2324-3-0x00000000743CE000-0x00000000743CF000-memory.dmp

    Filesize

    4KB

  • memory/2324-4-0x00000000743C0000-0x0000000074B70000-memory.dmp

    Filesize

    7.7MB