General

  • Target

    wave.exe

  • Size

    121KB

  • Sample

    250115-wkcn2s1rbl

  • MD5

    0c8d27584306ac7ca56b6642847c83f1

  • SHA1

    a5be54c39b1ee1a173f0b78966b52de9f661c715

  • SHA256

    803396bb833dd85a4a5b4910b448442f8c78496d81d77117cf4b534c35b9967c

  • SHA512

    1628197016ba08acd9ace409eb0e8afc579ea7a9b22268fc56520a34383288edd68ab00e36ee4030de39f255b12d47c1512575c79cb7da8168c7fe5e0c280831

  • SSDEEP

    3072:tw+jqm91UbTKXqeCHHoaqyfiFKDt+CS4fVX3Lwa4:aWP91UbMCoEfiFKZ+CS6Lwa

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    7276

  • startup_name

    wave

Targets

    • Target

      wave.exe

    • Size

      121KB

    • MD5

      0c8d27584306ac7ca56b6642847c83f1

    • SHA1

      a5be54c39b1ee1a173f0b78966b52de9f661c715

    • SHA256

      803396bb833dd85a4a5b4910b448442f8c78496d81d77117cf4b534c35b9967c

    • SHA512

      1628197016ba08acd9ace409eb0e8afc579ea7a9b22268fc56520a34383288edd68ab00e36ee4030de39f255b12d47c1512575c79cb7da8168c7fe5e0c280831

    • SSDEEP

      3072:tw+jqm91UbTKXqeCHHoaqyfiFKDt+CS4fVX3Lwa4:aWP91UbMCoEfiFKZ+CS6Lwa

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks