General

  • Target

    405a6cc22fd599462f76473603d4a62264a43a2f81c229bd1fd1816de3188b0a.exe

  • Size

    47KB

  • Sample

    241208-cpvwmssldj

  • MD5

    290b0d92c40e605605a8fb33a53a745a

  • SHA1

    a72ce92541d236cbc50e7d55e70c02a81317a64c

  • SHA256

    405a6cc22fd599462f76473603d4a62264a43a2f81c229bd1fd1816de3188b0a

  • SHA512

    6060976350871533eb399508e4a0dc7e72171d812edfdd8a2b554b1ab306f731c5b1ef2fccc37a3f575e4141121c165aa0c9bbf627113b63e2983c0b4c257942

  • SSDEEP

    768:rlh0npoiiUcjlJInbd/bqrCPZ5Sb/D/qVI3vW50v:RuWjjgnJ/bMo5Sb/+VIFv

Malware Config

Extracted

Family

xenorat

C2

96.126.118.61

Mutex

Microsoft Windows_3371808

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    5037

  • startup_name

    svchost.exe

Targets

    • Target

      405a6cc22fd599462f76473603d4a62264a43a2f81c229bd1fd1816de3188b0a.exe

    • Size

      47KB

    • MD5

      290b0d92c40e605605a8fb33a53a745a

    • SHA1

      a72ce92541d236cbc50e7d55e70c02a81317a64c

    • SHA256

      405a6cc22fd599462f76473603d4a62264a43a2f81c229bd1fd1816de3188b0a

    • SHA512

      6060976350871533eb399508e4a0dc7e72171d812edfdd8a2b554b1ab306f731c5b1ef2fccc37a3f575e4141121c165aa0c9bbf627113b63e2983c0b4c257942

    • SSDEEP

      768:rlh0npoiiUcjlJInbd/bqrCPZ5Sb/D/qVI3vW50v:RuWjjgnJ/bMo5Sb/+VIFv

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks