General

  • Target

    niggers.exe

  • Size

    45KB

  • Sample

    250105-rjed2aylhl

  • MD5

    ae22d8f92efa607adc88410cff6e5d73

  • SHA1

    69ae5beea80c2e3fd4077311f7c5b2f9076e4125

  • SHA256

    c4c6f3bc982004a69ff8e6975bbff0dc139eef614014d84207d0eb1e7fc73bae

  • SHA512

    507b76f59c4af1e7d5c5f15fc975c7e449ff07f07341b156102452d28962e5a8df37f2967bf9ac931cc8abc7d26e42a61461954d53bb8ce3fbb6faf3c4390e29

  • SSDEEP

    768:5dhO/poiiUcjlJIn4JH9Xqk5nWEZ5SbTDa6WI7CPW5P:3w+jjgnAH9XqcnW85SbTTWI3

Malware Config

Extracted

Family

xenorat

C2

192.168.1.145

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    temp

  • port

    4444

  • startup_name

    Efi spoofer auto spoof

Targets

    • Target

      niggers.exe

    • Size

      45KB

    • MD5

      ae22d8f92efa607adc88410cff6e5d73

    • SHA1

      69ae5beea80c2e3fd4077311f7c5b2f9076e4125

    • SHA256

      c4c6f3bc982004a69ff8e6975bbff0dc139eef614014d84207d0eb1e7fc73bae

    • SHA512

      507b76f59c4af1e7d5c5f15fc975c7e449ff07f07341b156102452d28962e5a8df37f2967bf9ac931cc8abc7d26e42a61461954d53bb8ce3fbb6faf3c4390e29

    • SSDEEP

      768:5dhO/poiiUcjlJIn4JH9Xqk5nWEZ5SbTDa6WI7CPW5P:3w+jjgnAH9XqcnW85SbTTWI3

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks