General

  • Target

    asd.exe

  • Size

    45KB

  • Sample

    241208-sr9qksslfm

  • MD5

    bf05e099a64c9a2b55d8760ab01b5b72

  • SHA1

    9128ad0d105952dcff281cb5df76145247f5eaef

  • SHA256

    a476f7a5bc91669830de6d48aa990b29c9126f2e8230dc51c85728bb46db4159

  • SHA512

    04a1582a859ba95051ca90bab39d0326a8eb6f7cb209b659223841ed712f744362b140267529c4b66a99a1905d32232c70c5c93b283b6adc0b21696271eac954

  • SSDEEP

    768:GdhO/poiiUcjlJInmn+eP3H9Xqk5nWEZ5SbTDa5uI7CPW56:ww+jjgnYH9XqcnW85SbT8uIy

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno

Attributes
  • delay

    1

  • install_path

    appdata

  • port

    4444

  • startup_name

    chrome.exe

Targets

    • Target

      asd.exe

    • Size

      45KB

    • MD5

      bf05e099a64c9a2b55d8760ab01b5b72

    • SHA1

      9128ad0d105952dcff281cb5df76145247f5eaef

    • SHA256

      a476f7a5bc91669830de6d48aa990b29c9126f2e8230dc51c85728bb46db4159

    • SHA512

      04a1582a859ba95051ca90bab39d0326a8eb6f7cb209b659223841ed712f744362b140267529c4b66a99a1905d32232c70c5c93b283b6adc0b21696271eac954

    • SSDEEP

      768:GdhO/poiiUcjlJInmn+eP3H9Xqk5nWEZ5SbTDa5uI7CPW56:ww+jjgnYH9XqcnW85SbT8uIy

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks