General

  • Target

    Client.exe

  • Size

    45KB

  • Sample

    250322-ylxrqatkz4

  • MD5

    dd96a8b21fb100affb8df038d0b8b571

  • SHA1

    d51aaf85de04ba1f9d0fdb15579d9bd7a2fd343c

  • SHA256

    add0eddbaee1ea36c8f7879c17b3b5fc0f2cf0982b47c9aecf66b6b97a2d3ca4

  • SHA512

    fe509d0e9719e20ea85775f96f9367d91881c1e485e50aa22cfb677e186c1ffd9352deed72373ca37abe06180097438e6038164b30991b1e9087f53298942d47

  • SSDEEP

    768:YdhO/poiiUcjlJIn5fdH9Xqk5nWEZ5SbTDaoWI7CPW5g:Kw+jjgnpdH9XqcnW85SbTJWIo

Malware Config

Extracted

Family

xenorat

C2

anyone-center.gl.at.ply.gg

Mutex

4dfb8031-19a0-4b82-bddc-e152f936aa12

Attributes
  • delay

    4000

  • install_path

    appdata

  • port

    8080

  • startup_name

    Update.exe

Targets

    • Target

      Client.exe

    • Size

      45KB

    • MD5

      dd96a8b21fb100affb8df038d0b8b571

    • SHA1

      d51aaf85de04ba1f9d0fdb15579d9bd7a2fd343c

    • SHA256

      add0eddbaee1ea36c8f7879c17b3b5fc0f2cf0982b47c9aecf66b6b97a2d3ca4

    • SHA512

      fe509d0e9719e20ea85775f96f9367d91881c1e485e50aa22cfb677e186c1ffd9352deed72373ca37abe06180097438e6038164b30991b1e9087f53298942d47

    • SSDEEP

      768:YdhO/poiiUcjlJIn5fdH9Xqk5nWEZ5SbTDaoWI7CPW5g:Kw+jjgnpdH9XqcnW85SbTJWIo

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks