General

  • Target

    nigga134.exe

  • Size

    45KB

  • Sample

    241229-nrcnma1jbv

  • MD5

    5e915d8b490472076ea76b8e5692a4c5

  • SHA1

    72dce81720b56ece290b74a1d1be48026f80a5ae

  • SHA256

    36fafa54e8346088a77ee47c02b2932841dc8b18e9cabd82fd94f1395bfb6840

  • SHA512

    6a3c8960f4436c7d5772978c7c22f6d3cbb59efd4259b97f32175b7a42ee56a6ec9a9a980aa63a9af47a301ff36b503e9f4aa1af7167c2e99ebf9a66397b89de

  • SSDEEP

    768:KdhO/poiiUcjlJInUA3H9Xqk5nWEZ5SbTDajuI7CPW55:sw+jjgnfH9XqcnW85SbTuuIh

Malware Config

Extracted

Family

xenorat

C2

147.185.221.24

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    42627

  • startup_name

    nothingset

Targets

    • Target

      nigga134.exe

    • Size

      45KB

    • MD5

      5e915d8b490472076ea76b8e5692a4c5

    • SHA1

      72dce81720b56ece290b74a1d1be48026f80a5ae

    • SHA256

      36fafa54e8346088a77ee47c02b2932841dc8b18e9cabd82fd94f1395bfb6840

    • SHA512

      6a3c8960f4436c7d5772978c7c22f6d3cbb59efd4259b97f32175b7a42ee56a6ec9a9a980aa63a9af47a301ff36b503e9f4aa1af7167c2e99ebf9a66397b89de

    • SSDEEP

      768:KdhO/poiiUcjlJInUA3H9Xqk5nWEZ5SbTDajuI7CPW55:sw+jjgnfH9XqcnW85SbTuuIh

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

MITRE ATT&CK Enterprise v15

Tasks