General

  • Target

    eulen.exe

  • Size

    74KB

  • Sample

    250117-28l6aawraj

  • MD5

    3844571d2d25e1112db4d525422f8ad2

  • SHA1

    3ee0f8874270f73c417a2a56e506a49b850cef8e

  • SHA256

    c4c21224b91351cbd943ca77e14c1c458815104ab9ffa5d252615d75e736f725

  • SHA512

    fd0ac668e7f85b5bba70bc01db2ae4c63b85519ad8059aaec4142be92ea4642d242fc6fea4fc78bc4cf36b1b67ec4e4564c8effaab6987042acb738187179705

  • SSDEEP

    1536:Tw+jjgn2yH9XqcnW85SbTBqWIy8+Qlr6SYCmQqy15X:Tw+jq2s91UbTBqH+Q4wqy15X

Malware Config

Extracted

Family

xenorat

C2

147.185.221.25

Mutex

Eulen

Attributes
  • delay

    1

  • install_path

    temp

  • port

    18889

  • startup_name

    Update

Targets

    • Target

      eulen.exe

    • Size

      74KB

    • MD5

      3844571d2d25e1112db4d525422f8ad2

    • SHA1

      3ee0f8874270f73c417a2a56e506a49b850cef8e

    • SHA256

      c4c21224b91351cbd943ca77e14c1c458815104ab9ffa5d252615d75e736f725

    • SHA512

      fd0ac668e7f85b5bba70bc01db2ae4c63b85519ad8059aaec4142be92ea4642d242fc6fea4fc78bc4cf36b1b67ec4e4564c8effaab6987042acb738187179705

    • SSDEEP

      1536:Tw+jjgn2yH9XqcnW85SbTBqWIy8+Qlr6SYCmQqy15X:Tw+jq2s91UbTBqH+Q4wqy15X

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks