General
-
Target
Vector-Fixers.exe
-
Size
6.8MB
-
Sample
250312-xy8jba1rx4
-
MD5
4bfdb7a894934fffd363b615abe4a83f
-
SHA1
945d388fe7f0a7024174fe582e3cb11037757748
-
SHA256
bfa03225bbcd2ef329fd0bf709db7ca3eb6f624cdc12cc519f503738fe34f75c
-
SHA512
e0e390fb388fd0657aae1ba459b609144650adf3b4f7a2c9144704cbbe75d5a4db42af13865120675425597928d65075f499c2c832ecbfe6c54cfa3f73a999da
-
SSDEEP
196608:TV1ZTrB6ylnlPzf+JiJCsmFMvQn6hqgdhA:dBRlnlPSa7mmvQpgdhA
Behavioral task
behavioral1
Sample
Vector-Fixers.exe
Resource
win11-20250217-en
Malware Config
Extracted
xenorat
172.19.82.226
Vector-fixer
-
delay
5000
-
install_path
temp
-
port
4444
-
startup_name
System23
Targets
-
-
Target
Vector-Fixers.exe
-
Size
6.8MB
-
MD5
4bfdb7a894934fffd363b615abe4a83f
-
SHA1
945d388fe7f0a7024174fe582e3cb11037757748
-
SHA256
bfa03225bbcd2ef329fd0bf709db7ca3eb6f624cdc12cc519f503738fe34f75c
-
SHA512
e0e390fb388fd0657aae1ba459b609144650adf3b4f7a2c9144704cbbe75d5a4db42af13865120675425597928d65075f499c2c832ecbfe6c54cfa3f73a999da
-
SSDEEP
196608:TV1ZTrB6ylnlPzf+JiJCsmFMvQn6hqgdhA:dBRlnlPSa7mmvQpgdhA
-
Detect XenoRat Payload
-
Xenorat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3