General

  • Target

    AM1.exe

  • Size

    33KB

  • Sample

    250103-bgjmzasrdz

  • MD5

    38b58ea0e9fc2d5d719afb3267560e21

  • SHA1

    da4ab3b765dea42125a0c4386ef02327e6647790

  • SHA256

    8f326835e232a7b9ec21e3d09fa0707f806379486ed82acbbfc1538297779021

  • SHA512

    f9c7d1df0db50c9c5c79c94397c1ae5b19487a230dab429df1852bbe979514efccc9843bc040804e09efbc64696ca6e0a92b5eb091919a844ad0783f775f68a7

  • SSDEEP

    768:KmQZqx1lYcJHNP1hWmkPV+b8me1UMQkSF4dXbOfq1JkFAFta:K0lYUWDPV+bS+Mw45bOlFAFta

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

fivefivefive

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    2025

  • startup_name

    RuntimeBroker

Targets

    • Target

      AM1.exe

    • Size

      33KB

    • MD5

      38b58ea0e9fc2d5d719afb3267560e21

    • SHA1

      da4ab3b765dea42125a0c4386ef02327e6647790

    • SHA256

      8f326835e232a7b9ec21e3d09fa0707f806379486ed82acbbfc1538297779021

    • SHA512

      f9c7d1df0db50c9c5c79c94397c1ae5b19487a230dab429df1852bbe979514efccc9843bc040804e09efbc64696ca6e0a92b5eb091919a844ad0783f775f68a7

    • SSDEEP

      768:KmQZqx1lYcJHNP1hWmkPV+b8me1UMQkSF4dXbOfq1JkFAFta:K0lYUWDPV+bS+Mw45bOlFAFta

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks