General

  • Target

    ByeFunV1Helper.exeu

  • Size

    61KB

  • Sample

    241128-xrchasslen

  • MD5

    4853487df85809a47fd28f81f60914e3

  • SHA1

    efa5f925e0587a5282154def356c93ca6c56fac8

  • SHA256

    93d60d73b33815ffcfa599af4dde3a900bf3ed880d667b2029a6c791d6340810

  • SHA512

    84afd14836ac592548e35f9c03eaabcce22a0d18e3ad596be99f3924e094856d9733fb3e2844bc629ba9dedcdcf22c14d77b2527de475a95d788f6ee2678623d

  • SSDEEP

    1536:Bw+jjgnNH9XqcnW85SbTiuIyLJ+/oOyc:Bw+jqV91UbTiIN+Afc

Malware Config

Extracted

Family

xenorat

C2

10.9.30.162

Mutex

ByeFunV1Helper

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4872

  • startup_name

    BYEFUNHELPERINJECTED

Targets

    • Target

      ByeFunV1Helper.exeu

    • Size

      61KB

    • MD5

      4853487df85809a47fd28f81f60914e3

    • SHA1

      efa5f925e0587a5282154def356c93ca6c56fac8

    • SHA256

      93d60d73b33815ffcfa599af4dde3a900bf3ed880d667b2029a6c791d6340810

    • SHA512

      84afd14836ac592548e35f9c03eaabcce22a0d18e3ad596be99f3924e094856d9733fb3e2844bc629ba9dedcdcf22c14d77b2527de475a95d788f6ee2678623d

    • SSDEEP

      1536:Bw+jjgnNH9XqcnW85SbTiuIyLJ+/oOyc:Bw+jqV91UbTiIN+Afc

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks