General

  • Target

    c1f70fb2c07ec6e8a69d1bfc4998703481adf5301b44af75b125f11776da77f8.exe

  • Size

    127KB

  • Sample

    250324-mjzbzs1lw7

  • MD5

    e56cee3aba6280693ac9bcd2c4f184ec

  • SHA1

    e2ec215868b0a2528e5ee25eb89f9661527e2f78

  • SHA256

    c1f70fb2c07ec6e8a69d1bfc4998703481adf5301b44af75b125f11776da77f8

  • SHA512

    466732320ee94693bc8327826b1021e414c8b03c35c0a0302c5f98404b2886b1274a327804e8449f298454e76e6e69693746a77f767f6145a96430f4a15e4929

  • SSDEEP

    3072:TQiLrCFq0btnCrCFaQImMqU/unn8fVcgz7Gp1q1vg:5OrFZaqU/uwcgvGn6

Malware Config

Targets

    • Target

      c1f70fb2c07ec6e8a69d1bfc4998703481adf5301b44af75b125f11776da77f8.exe

    • Size

      127KB

    • MD5

      e56cee3aba6280693ac9bcd2c4f184ec

    • SHA1

      e2ec215868b0a2528e5ee25eb89f9661527e2f78

    • SHA256

      c1f70fb2c07ec6e8a69d1bfc4998703481adf5301b44af75b125f11776da77f8

    • SHA512

      466732320ee94693bc8327826b1021e414c8b03c35c0a0302c5f98404b2886b1274a327804e8449f298454e76e6e69693746a77f767f6145a96430f4a15e4929

    • SSDEEP

      3072:TQiLrCFq0btnCrCFaQImMqU/unn8fVcgz7Gp1q1vg:5OrFZaqU/uwcgvGn6

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks