General

  • Target

    virus_src.bat

  • Size

    652B

  • Sample

    241207-zqa9yssrgy

  • MD5

    3d20c8ba40ea3e85334342e7c01018bd

  • SHA1

    b678d69ec173ca2e385ba8a8bda18be618f5af2c

  • SHA256

    4a4f56be826841723b685fe98aedfb81eb3c11dfac2f4a466f4c78eef2c5bb71

  • SHA512

    0fdeac77b6c4f3ba7ee53c33785c6c576873a7798d8921721d21498910316893b8ebb0e499759bd1d62239506499ce4bf9f222a2019c4a882ffd1a2ce86a6776

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

09fasifjkansmf8s9ghjndui90gijmfgpjkjyt90y843

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    4444

  • startup_name

    nothingset

Targets

    • Target

      virus_src.bat

    • Size

      652B

    • MD5

      3d20c8ba40ea3e85334342e7c01018bd

    • SHA1

      b678d69ec173ca2e385ba8a8bda18be618f5af2c

    • SHA256

      4a4f56be826841723b685fe98aedfb81eb3c11dfac2f4a466f4c78eef2c5bb71

    • SHA512

      0fdeac77b6c4f3ba7ee53c33785c6c576873a7798d8921721d21498910316893b8ebb0e499759bd1d62239506499ce4bf9f222a2019c4a882ffd1a2ce86a6776

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks