General

  • Target

    9cf34288dda36ca0b013d6978d1acfe4.bin

  • Size

    552KB

  • Sample

    241210-r79vvatjgm

  • MD5

    997d2d7b6986515f7bfbc84c9edaa0e0

  • SHA1

    edf4d5dae05115f4bff23e54506f3c7f4f11bfa8

  • SHA256

    feb5795a325a28e892dddd468239194fb38a2fddec638cc43d7a314ad7e639b7

  • SHA512

    1afe78a94bf37e0eab7a4053c439968b1af886e82ae662ba1468dd2274cae137eb050f04c5ca1ba60735a315b455d36e2c1d0c95464c3671a2bf508baf3a3c81

  • SSDEEP

    12288:OizbkQBypPADIImm3ldv5Xs1jZxuzypMtd/JlmBg:lCPAD7mmVdYxyyM/Jlmu

Malware Config

Extracted

Family

xenorat

C2

luxuryshield.giize.com

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    4444

  • startup_name

    nothingset

Targets

    • Target

      a40e1563e9bbc7683cc81adcecdf4450817ad2e18ee8534b85714081a500dd65.exe

    • Size

      743KB

    • MD5

      9cf34288dda36ca0b013d6978d1acfe4

    • SHA1

      634560fe79683a2019ee75f669e5bff02c1789f7

    • SHA256

      a40e1563e9bbc7683cc81adcecdf4450817ad2e18ee8534b85714081a500dd65

    • SHA512

      fcf0a8ce71ce9bb1fcba9f14158e8919098dfa75172128bf886bd256216a3b9ef0e44c1ac63177e228fb85522077c8aa1080e2bd415ce29fe341a39dd942f764

    • SSDEEP

      12288:GN2pJlOwXBiPzEhmH5lxgZvvXt+FgqQ8t/6SUoWDGxPlh3i4H9ksxUWv:XrZvPQqqQ8tCSQoh3hxd

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks