General

  • Target

    gowno.exe

  • Size

    45KB

  • Sample

    250319-2dx93av1a1

  • MD5

    6145e62108a1aa3cd628939ba740449d

  • SHA1

    812b83703130caf3832af8f9fb5dbd5d9045a2fc

  • SHA256

    ef2ba29f54fd3d48876405dc424f61ab27222fe36b5b5721c4a5ccca6e879ad1

  • SHA512

    20a57cb7119e570ded6876ca830c8070e239340ec64c0c0b8d0fbeeea121485b69c2372a0dcdb07ea54c72b9991db76e75f439dad442cccfd82987c7456a175f

  • SSDEEP

    768:RdhO/poiiUcjlJInN1H9Xqk5nWEZ5SbTDamuI7CPW5T:Pw+jjgnHH9XqcnW85SbTzuIr

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

testgowna

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    5858

  • startup_name

    nothingset

Targets

    • Target

      gowno.exe

    • Size

      45KB

    • MD5

      6145e62108a1aa3cd628939ba740449d

    • SHA1

      812b83703130caf3832af8f9fb5dbd5d9045a2fc

    • SHA256

      ef2ba29f54fd3d48876405dc424f61ab27222fe36b5b5721c4a5ccca6e879ad1

    • SHA512

      20a57cb7119e570ded6876ca830c8070e239340ec64c0c0b8d0fbeeea121485b69c2372a0dcdb07ea54c72b9991db76e75f439dad442cccfd82987c7456a175f

    • SSDEEP

      768:RdhO/poiiUcjlJInN1H9Xqk5nWEZ5SbTDamuI7CPW5T:Pw+jjgnHH9XqcnW85SbTzuIr

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks