General

  • Target

    skid.exe

  • Size

    46KB

  • Sample

    250331-s6pc7avqz5

  • MD5

    b61b5c0bff0b8923d7457866ff3ddf4e

  • SHA1

    dbe578aee200e3665053801d93447e3e98e6c75a

  • SHA256

    5c24efdc7fa4e803616b48f2fa03c861b2d87dc6339b298baf8626a220b2e930

  • SHA512

    624ed755bed9051ed952559814ece72d5e8c97c9c3a28137a90893b474dbe00311fd27050e5cc60fe70dbb74e56c1c4126a3b8d6b910b56135e4185f8d79c94c

  • SSDEEP

    768:7dhO/poiiUcjlJInWa3H9Xqk5nWEZ5SbTDaTuI7CPW5h:pw+jjgnzH9XqcnW85SbTWuIZ

Malware Config

Extracted

Family

xenorat

C2

tcp://adminaahliya-20192.portmap.io

Mutex

skid_nigger@skid_C2

Attributes
  • delay

    5000

  • install_path

    appdata

  • port

    20192

  • startup_name

    Windows Updater

Targets

    • Target

      skid.exe

    • Size

      46KB

    • MD5

      b61b5c0bff0b8923d7457866ff3ddf4e

    • SHA1

      dbe578aee200e3665053801d93447e3e98e6c75a

    • SHA256

      5c24efdc7fa4e803616b48f2fa03c861b2d87dc6339b298baf8626a220b2e930

    • SHA512

      624ed755bed9051ed952559814ece72d5e8c97c9c3a28137a90893b474dbe00311fd27050e5cc60fe70dbb74e56c1c4126a3b8d6b910b56135e4185f8d79c94c

    • SSDEEP

      768:7dhO/poiiUcjlJInWa3H9Xqk5nWEZ5SbTDaTuI7CPW5h:pw+jjgnzH9XqcnW85SbTWuIZ

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks