General

  • Target

    05692e7735450069cc9e0c78bb80514c312d40ef47efbbbaae701a624fbabfba.lnk

  • Size

    2KB

  • Sample

    241210-cjx4tavlhq

  • MD5

    cfd668a55ea2ee344f5a9badb6ff18b7

  • SHA1

    b3927747076a408a9e73afa0df3a6adadcbae950

  • SHA256

    05692e7735450069cc9e0c78bb80514c312d40ef47efbbbaae701a624fbabfba

  • SHA512

    e8976004a15afced95af6a14e0c8360be13014dffdcac71aff24964036318b9cec958ce87db71dfec79f88944367ed7c6beb0b6ba8187f7329d44b55fc3fa943

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://www.stipamana.com/vbsznjgzfzgolnzdgh/tydthcgfhjdfhsfghxffsjhx/vbfdhydjyfjfxhgjhxgh/pafdfgzdf.vbs

Extracted

Family

xenorat

C2

dns.stipamana.com

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    12000

  • install_path

    appdata

  • port

    4567

  • startup_name

    mrec

Targets

    • Target

      05692e7735450069cc9e0c78bb80514c312d40ef47efbbbaae701a624fbabfba.lnk

    • Size

      2KB

    • MD5

      cfd668a55ea2ee344f5a9badb6ff18b7

    • SHA1

      b3927747076a408a9e73afa0df3a6adadcbae950

    • SHA256

      05692e7735450069cc9e0c78bb80514c312d40ef47efbbbaae701a624fbabfba

    • SHA512

      e8976004a15afced95af6a14e0c8360be13014dffdcac71aff24964036318b9cec958ce87db71dfec79f88944367ed7c6beb0b6ba8187f7329d44b55fc3fa943

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Office macro that triggers on suspicious action

      Office document macro which triggers in special circumstances - often malicious.

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks