General

  • Target

    Bootstrapper Test.exe

  • Size

    50KB

  • Sample

    250216-qxa34azjbv

  • MD5

    91185814f6daab193232e538231043b8

  • SHA1

    9228f6a0760796d1b91fb42f256c10cd13f88223

  • SHA256

    868a09b65998aa4794021e384c19214f9cae84d7d3be857a420dcea324a7c37f

  • SHA512

    ab61e525001cec9eb706cb6637a1f1475814a49682e96b7c71515dd98ef8540d6ca6b6506d6d7e1a774345a97c79a9c8fca5673ac580e4108f61a091e07a7111

  • SSDEEP

    768:CdhO/poiiUcjlJInPaH9Xqk5nWEZ5SbTDaCuI7CPW5Sspa:kw+jjgniH9XqcnW85SbTvuIqspa

Malware Config

Extracted

Family

xenorat

C2

193.161.193.99

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    1194

  • startup_name

    Solara Bootstrapper Dependinces

Targets

    • Target

      Bootstrapper Test.exe

    • Size

      50KB

    • MD5

      91185814f6daab193232e538231043b8

    • SHA1

      9228f6a0760796d1b91fb42f256c10cd13f88223

    • SHA256

      868a09b65998aa4794021e384c19214f9cae84d7d3be857a420dcea324a7c37f

    • SHA512

      ab61e525001cec9eb706cb6637a1f1475814a49682e96b7c71515dd98ef8540d6ca6b6506d6d7e1a774345a97c79a9c8fca5673ac580e4108f61a091e07a7111

    • SSDEEP

      768:CdhO/poiiUcjlJInPaH9Xqk5nWEZ5SbTDaCuI7CPW5Sspa:kw+jjgniH9XqcnW85SbTvuIqspa

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks