General

  • Target

    680632686012cf732ac1fa640bc675528bfac38cfaf4415be9c8c6f58e1e161f

  • Size

    2.7MB

  • Sample

    250331-vr6d9styfz

  • MD5

    f1085213dc1d53f8edb91623227ea124

  • SHA1

    826452b193956372738c0cacac7a04b6fe728bfd

  • SHA256

    680632686012cf732ac1fa640bc675528bfac38cfaf4415be9c8c6f58e1e161f

  • SHA512

    72fcb542d964a1aa32a98a44b54efa979ff5bf30df47e5e8a7551d0651a0fb5956f471d0934a390366c5f431377220e89e0abecb69e51e20abfbbac6fcb3ed12

  • SSDEEP

    49152:cDjlabwz9YogON/vfolSuInvHco9SkPyduk/LXgKXEDsAu3echFz2u5/:cqwdgOulSuIn0o9SkPydxLXZXHechFCE

Malware Config

Extracted

Family

xenorat

C2

127.0.0.1

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    4444

  • startup_name

    nothingset

Targets

    • Target

      680632686012cf732ac1fa640bc675528bfac38cfaf4415be9c8c6f58e1e161f

    • Size

      2.7MB

    • MD5

      f1085213dc1d53f8edb91623227ea124

    • SHA1

      826452b193956372738c0cacac7a04b6fe728bfd

    • SHA256

      680632686012cf732ac1fa640bc675528bfac38cfaf4415be9c8c6f58e1e161f

    • SHA512

      72fcb542d964a1aa32a98a44b54efa979ff5bf30df47e5e8a7551d0651a0fb5956f471d0934a390366c5f431377220e89e0abecb69e51e20abfbbac6fcb3ed12

    • SSDEEP

      49152:cDjlabwz9YogON/vfolSuInvHco9SkPyduk/LXgKXEDsAu3echFz2u5/:cqwdgOulSuIn0o9SkPydxLXZXHechFCE

    • Detect XenoRat Payload

    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Xenorat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks