General

  • Target

    123.exe

  • Size

    45KB

  • Sample

    241227-bxlr9sxrdz

  • MD5

    5a778e834f35c916c39c65d60e039fd0

  • SHA1

    68f3eaf6f75f5121f478c9ddb18ac0bd87622c1a

  • SHA256

    e7fa7df68f52c8211dcf98a83ce68d333c1c9ad47c695e1c81d251c71dab2267

  • SHA512

    3a2af26f175124f04abcd7587a80caa948c3489c6a386274af865f2a0c47be62998b355abf8d92562cf022a2e8a2a1d7e269c9bbd3a4a58054822e15addc74e1

  • SSDEEP

    768:RdhO/poiiUcjlJIn7rtUH9Xqk5nWEZ5SbTDaQWI7CPW5U:Pw+jjgn7BUH9XqcnW85SbThWIM

Malware Config

Extracted

Family

xenorat

C2

192.168.0.144

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4444

  • startup_name

    nothingset

Targets

    • Target

      123.exe

    • Size

      45KB

    • MD5

      5a778e834f35c916c39c65d60e039fd0

    • SHA1

      68f3eaf6f75f5121f478c9ddb18ac0bd87622c1a

    • SHA256

      e7fa7df68f52c8211dcf98a83ce68d333c1c9ad47c695e1c81d251c71dab2267

    • SHA512

      3a2af26f175124f04abcd7587a80caa948c3489c6a386274af865f2a0c47be62998b355abf8d92562cf022a2e8a2a1d7e269c9bbd3a4a58054822e15addc74e1

    • SSDEEP

      768:RdhO/poiiUcjlJIn7rtUH9Xqk5nWEZ5SbTDaQWI7CPW5U:Pw+jjgn7BUH9XqcnW85SbThWIM

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks