General

  • Target

    BootstrapperNew1.exe

  • Size

    50KB

  • Sample

    250216-b3bt9awjfs

  • MD5

    2db839a013bb2742e80cdcf4edc63f39

  • SHA1

    8b94a91e13f1ff30a3ca2627d3b43affacbb66b0

  • SHA256

    47497f110de244113679de02a3eefc50a9831c13e7c86b45ea3e0ce8d0072f7d

  • SHA512

    3f0210b4a1245d67c96f563a191b4c11455137afee436ec2b41d2b672a93aed4ebeb5ac0814217ef9fc3c1706c371028670583876d829bccc244206af34e324a

  • SSDEEP

    768:UdhO/poiiUcjlJIn8aH9Xqk5nWEZ5SbTDaCuI7CPW5ispt:uw+jjgnfH9XqcnW85SbTvuIqspt

Malware Config

Extracted

Family

xenorat

C2

193.161.193.99

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    4444

  • startup_name

    Solara Bootstrapper Dependinces

Targets

    • Target

      BootstrapperNew1.exe

    • Size

      50KB

    • MD5

      2db839a013bb2742e80cdcf4edc63f39

    • SHA1

      8b94a91e13f1ff30a3ca2627d3b43affacbb66b0

    • SHA256

      47497f110de244113679de02a3eefc50a9831c13e7c86b45ea3e0ce8d0072f7d

    • SHA512

      3f0210b4a1245d67c96f563a191b4c11455137afee436ec2b41d2b672a93aed4ebeb5ac0814217ef9fc3c1706c371028670583876d829bccc244206af34e324a

    • SSDEEP

      768:UdhO/poiiUcjlJIn8aH9Xqk5nWEZ5SbTDaCuI7CPW5ispt:uw+jjgnfH9XqcnW85SbTvuIqspt

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks