General

  • Target

    https://tinyurl.com/jakbpv3c

  • Sample

    250309-1jz56ssvc1

Malware Config

Extracted

Family

xenorat

C2

pdf-switched.gl.at.ply.gg

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    48925

  • startup_name

    Exploits

Targets

MITRE ATT&CK Enterprise v15

Tasks