General
-
Target
25350f356b356c9ab48ebfcca67cad970d1a213f8716a1d006d339a38f0f7cc5
-
Size
1.7MB
-
Sample
241128-s1vb9a1ra1
-
MD5
cfbd38c30f1100b5213c9dd008b6e883
-
SHA1
03da6d72c9d92bea2b2e5c4a8538f0a3628fbe73
-
SHA256
25350f356b356c9ab48ebfcca67cad970d1a213f8716a1d006d339a38f0f7cc5
-
SHA512
a7d3bce28d0443dbe671394bd6c720f0fba28cf18ee0a5c3bfe547c3ffaebb9431ebe40749de1eb460b03696a401c167d76de99e9769e33ca62a3bf8302a5b04
-
SSDEEP
24576:A05tJ299B2yluNG+pyZNNs62IgDEs5GM7qSNKs0kjk7/ewTZJuw2PZ9Wb7BjpI/P:A012XZ03pETO3J7qGKs0k47jLj2P86/
Static task
static1
Behavioral task
behavioral1
Sample
25350f356b356c9ab48ebfcca67cad970d1a213f8716a1d006d339a38f0f7cc5.exe
Resource
win7-20240903-en
Malware Config
Extracted
xenorat
beastsband.com
x3n0
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
nothingset
Targets
-
-
Target
25350f356b356c9ab48ebfcca67cad970d1a213f8716a1d006d339a38f0f7cc5
-
Size
1.7MB
-
MD5
cfbd38c30f1100b5213c9dd008b6e883
-
SHA1
03da6d72c9d92bea2b2e5c4a8538f0a3628fbe73
-
SHA256
25350f356b356c9ab48ebfcca67cad970d1a213f8716a1d006d339a38f0f7cc5
-
SHA512
a7d3bce28d0443dbe671394bd6c720f0fba28cf18ee0a5c3bfe547c3ffaebb9431ebe40749de1eb460b03696a401c167d76de99e9769e33ca62a3bf8302a5b04
-
SSDEEP
24576:A05tJ299B2yluNG+pyZNNs62IgDEs5GM7qSNKs0kjk7/ewTZJuw2PZ9Wb7BjpI/P:A012XZ03pETO3J7qGKs0k47jLj2P86/
-
Detect XenoRat Payload
-
Xenorat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1