General

  • Target

    xeno rat client.exe

  • Size

    46KB

  • Sample

    241231-3a9dlaxkep

  • MD5

    0357dfb1dfb7ec98fe2f7a88f75fbd17

  • SHA1

    78fcc4a5df49947cd24d03ccbdc3af12891add10

  • SHA256

    03c3e1e4c32e9fb2667ef822a88eb6f843eb31878a22e248fd491c335453c45d

  • SHA512

    15491ff405cd9cdf93bfaef0a3bef426dc3e7d60898c2be8c305973dc56e47c57a715f8984fb6ef3de4c3a164e9d18d5e3f3d87f94a9f19e40c53a4edd86ddaf

  • SSDEEP

    768:6dqf0GXKojwYybbZWsiBHUuOC+iQKb9km3X9Z5SbTDapFt24:64R0z3ZWsiBHUup/9kmj5SbTcFb

Malware Config

Extracted

Family

xenorat

C2

localhost

Mutex

testing 123123

Attributes
  • delay

    1000

  • install_path

    nothingset

  • port

    1234

  • startup_name

    nothingset

Targets

    • Target

      xeno rat client.exe

    • Size

      46KB

    • MD5

      0357dfb1dfb7ec98fe2f7a88f75fbd17

    • SHA1

      78fcc4a5df49947cd24d03ccbdc3af12891add10

    • SHA256

      03c3e1e4c32e9fb2667ef822a88eb6f843eb31878a22e248fd491c335453c45d

    • SHA512

      15491ff405cd9cdf93bfaef0a3bef426dc3e7d60898c2be8c305973dc56e47c57a715f8984fb6ef3de4c3a164e9d18d5e3f3d87f94a9f19e40c53a4edd86ddaf

    • SSDEEP

      768:6dqf0GXKojwYybbZWsiBHUuOC+iQKb9km3X9Z5SbTDapFt24:64R0z3ZWsiBHUup/9kmj5SbTcFb

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

MITRE ATT&CK Enterprise v15

Tasks