General

  • Target

    SecuriteInfo.com.Win64.Malware-gen.25140.8272.exe

  • Size

    159KB

  • Sample

    250210-xkxjwsskgz

  • MD5

    6159b2025a32b10d721f03c7141577d8

  • SHA1

    829beb712c7ad268f05865bc982d9db519079433

  • SHA256

    8db64fb78d54b15b0648d454b3678b0200431114cb1058d70f4783278b7feb70

  • SHA512

    b6fd30a5c76d40b0949a34de2dba060bc915ccc0dc6fcc0b8050da9a064ff0f8c487cac4b1fa7b16d545c4c31d77f4a9aedb3997e17e96e3af60b724d60cfa22

  • SSDEEP

    3072:EahKyd2n31zf5GWp1icKAArDZz4N9GhbkrNEk1QOwgT:EahOzp0yN90QEOwc

Malware Config

Extracted

Family

xenorat

C2

failed2.myftp.org

Mutex

Winsock2Mutex

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4782

  • startup_name

    start.exe

Targets

    • Target

      SecuriteInfo.com.Win64.Malware-gen.25140.8272.exe

    • Size

      159KB

    • MD5

      6159b2025a32b10d721f03c7141577d8

    • SHA1

      829beb712c7ad268f05865bc982d9db519079433

    • SHA256

      8db64fb78d54b15b0648d454b3678b0200431114cb1058d70f4783278b7feb70

    • SHA512

      b6fd30a5c76d40b0949a34de2dba060bc915ccc0dc6fcc0b8050da9a064ff0f8c487cac4b1fa7b16d545c4c31d77f4a9aedb3997e17e96e3af60b724d60cfa22

    • SSDEEP

      3072:EahKyd2n31zf5GWp1icKAArDZz4N9GhbkrNEk1QOwgT:EahOzp0yN90QEOwc

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks