General

  • Target

    eulenreal.exe

  • Size

    74KB

  • Sample

    250117-24pevawpfq

  • MD5

    507b3e8756680aa9eb98924d2aa13434

  • SHA1

    137d3cdcfe15f23df7458ac47363fd7f186d807c

  • SHA256

    f369cdebe099937c116c8768d9764902a2a47d36e94504182b1e86c7cde7a135

  • SHA512

    e9f64908ba4e3c9bd589f5e10da3b4010ea18685e81b4f40cdaa74ef79f486da0546dee1900f5aa5ff3cafd4a9a195813cb664927aeb5700a5823a1cbefe6ff9

  • SSDEEP

    1536:ow+jjgntH9XqcnW85SbT8quIu8+Qlr6SYCmQqy15X:ow+jq191UbT8qD+Q4wqy15X

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Eulen

Attributes
  • delay

    1

  • install_path

    temp

  • port

    18889

  • startup_name

    Update

Targets

    • Target

      eulenreal.exe

    • Size

      74KB

    • MD5

      507b3e8756680aa9eb98924d2aa13434

    • SHA1

      137d3cdcfe15f23df7458ac47363fd7f186d807c

    • SHA256

      f369cdebe099937c116c8768d9764902a2a47d36e94504182b1e86c7cde7a135

    • SHA512

      e9f64908ba4e3c9bd589f5e10da3b4010ea18685e81b4f40cdaa74ef79f486da0546dee1900f5aa5ff3cafd4a9a195813cb664927aeb5700a5823a1cbefe6ff9

    • SSDEEP

      1536:ow+jjgntH9XqcnW85SbT8quIu8+Qlr6SYCmQqy15X:ow+jq191UbT8qD+Q4wqy15X

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks