General

  • Target

    skibidi.exe

  • Size

    51KB

  • Sample

    241230-c5y81avqfk

  • MD5

    22519d6182d8d97ef18b93aac9505c65

  • SHA1

    f2e6124e2567866a8fe81bd4e43a4fe401136296

  • SHA256

    1b7960f4002e371cf4a12ca7c041162ef3c5203c06b261d90ea58496c5dd60c5

  • SHA512

    83a926c66f7900163e8e3d7beef1347785d0c8c3d9d8bc74756621ea39189efe2d7dfc074ce57ae9d025c73ec823a6270628bd499d9c9f80642f918c91ca21cf

  • SSDEEP

    768:livdjHrddilbVauou7EoK4qd4zBFEHJdSkGPs2yPo+LGZYebFDa4JJ6RNSgNOZd:GpHmVauoBGBFQnks6CSYebFpmf4r

Malware Config

Extracted

Family

xenorat

C2

notthesigma-50237.portmap.host

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    2000

  • install_path

    appdata

  • port

    9003

  • startup_name

    nothingset

Targets

    • Target

      skibidi.exe

    • Size

      51KB

    • MD5

      22519d6182d8d97ef18b93aac9505c65

    • SHA1

      f2e6124e2567866a8fe81bd4e43a4fe401136296

    • SHA256

      1b7960f4002e371cf4a12ca7c041162ef3c5203c06b261d90ea58496c5dd60c5

    • SHA512

      83a926c66f7900163e8e3d7beef1347785d0c8c3d9d8bc74756621ea39189efe2d7dfc074ce57ae9d025c73ec823a6270628bd499d9c9f80642f918c91ca21cf

    • SSDEEP

      768:livdjHrddilbVauou7EoK4qd4zBFEHJdSkGPs2yPo+LGZYebFDa4JJ6RNSgNOZd:GpHmVauoBGBFQnks6CSYebFpmf4r

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks