General

  • Target

    test.exe

  • Size

    45KB

  • Sample

    250127-ahdbxazrhy

  • MD5

    21645270a894666d3b1907b66ddd147f

  • SHA1

    bfd5061be263edd2de98d17fb989a408fa7117b9

  • SHA256

    567d3d5648344b34020556c6dc5415cb96f4c385c314279c0a26c0ebac58851e

  • SHA512

    84ad094f677e06caf4f6a5b552afd9e0420f428e2ce86904340786bdfe979f8f345d72574a0012cc7224caa57fcb355b723ce14e63bd8d808e592cdd9346ec6e

  • SSDEEP

    768:tdhO/poiiUcjlJInuzH9Xqk5nWEZ5SbTDa0WI7CPW5/:jw+jjgnsH9XqcnW85SbTNWIX

Malware Config

Extracted

Family

xenorat

C2

24.ip.gl.ply.gg

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    3000

  • install_path

    appdata

  • port

    64438

  • startup_name

    cmd

Targets

    • Target

      test.exe

    • Size

      45KB

    • MD5

      21645270a894666d3b1907b66ddd147f

    • SHA1

      bfd5061be263edd2de98d17fb989a408fa7117b9

    • SHA256

      567d3d5648344b34020556c6dc5415cb96f4c385c314279c0a26c0ebac58851e

    • SHA512

      84ad094f677e06caf4f6a5b552afd9e0420f428e2ce86904340786bdfe979f8f345d72574a0012cc7224caa57fcb355b723ce14e63bd8d808e592cdd9346ec6e

    • SSDEEP

      768:tdhO/poiiUcjlJInuzH9Xqk5nWEZ5SbTDa0WI7CPW5/:jw+jjgnsH9XqcnW85SbTNWIX

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks