General

  • Target

    System32.exe

  • Size

    45KB

  • Sample

    241212-xzrbesvkcz

  • MD5

    896081ff179580794b2e56d763e60e5a

  • SHA1

    97dca39b6a660e9e1285b401456576fdd0998710

  • SHA256

    acf6b4e5100ebd3921ea434dfb8e6fe93c3933390ec960a18670120d6732125b

  • SHA512

    48809ea72174b61a8b6ee24c61a42257e60ac10980098c3fbad45cab00eb96065662bd57425f6dbd2f561f30ab88395f4cb568a7fdc62645824ed1de403a145e

  • SSDEEP

    768:MdhO/poiiUcjlJIndfH9Xqk5nWEZ5SbTDatuI7CPW5S:Gw+jjgnVH9XqcnW85SbTwuIK

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

System32

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    4444

  • startup_name

    System32

Targets

    • Target

      System32.exe

    • Size

      45KB

    • MD5

      896081ff179580794b2e56d763e60e5a

    • SHA1

      97dca39b6a660e9e1285b401456576fdd0998710

    • SHA256

      acf6b4e5100ebd3921ea434dfb8e6fe93c3933390ec960a18670120d6732125b

    • SHA512

      48809ea72174b61a8b6ee24c61a42257e60ac10980098c3fbad45cab00eb96065662bd57425f6dbd2f561f30ab88395f4cb568a7fdc62645824ed1de403a145e

    • SSDEEP

      768:MdhO/poiiUcjlJIndfH9Xqk5nWEZ5SbTDatuI7CPW5S:Gw+jjgnVH9XqcnW85SbTwuIK

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks