General

  • Target

    7a3de858fad4871d76df43dea61f493be5c47ccee5bd29d907cddd649ae94f1d.exe

  • Size

    45KB

  • Sample

    241130-w6c7ps1ldx

  • MD5

    602b57e32258293aa6cf7211dc28bebc

  • SHA1

    f943b76406d1a113f1b345368bb9a93a01e6e699

  • SHA256

    7a3de858fad4871d76df43dea61f493be5c47ccee5bd29d907cddd649ae94f1d

  • SHA512

    3a04cb14d6c1456679fecce2a6fef099f19132e6908772f4d4e7d9efa1b46dda5162cbfe5aad55b6c5a117eccbd9f89d32ca304302e5d8b03a8ea31f6760a291

  • SSDEEP

    768:ndhO/poiiUcjlJIn8fH9Xqk5nWEZ5SbTDa3VuI7CPW5J:dw+jjgnmH9XqcnW85SbTSVuIh

Malware Config

Extracted

Family

xenorat

C2

111.90.147.147

Mutex

tlgjjsck

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    80

  • startup_name

    nothingset

Targets

    • Target

      7a3de858fad4871d76df43dea61f493be5c47ccee5bd29d907cddd649ae94f1d.exe

    • Size

      45KB

    • MD5

      602b57e32258293aa6cf7211dc28bebc

    • SHA1

      f943b76406d1a113f1b345368bb9a93a01e6e699

    • SHA256

      7a3de858fad4871d76df43dea61f493be5c47ccee5bd29d907cddd649ae94f1d

    • SHA512

      3a04cb14d6c1456679fecce2a6fef099f19132e6908772f4d4e7d9efa1b46dda5162cbfe5aad55b6c5a117eccbd9f89d32ca304302e5d8b03a8ea31f6760a291

    • SSDEEP

      768:ndhO/poiiUcjlJIn8fH9Xqk5nWEZ5SbTDa3VuI7CPW5J:dw+jjgnmH9XqcnW85SbTSVuIh

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

MITRE ATT&CK Enterprise v15

Tasks